Connecticut might soon follow Ohio and Utah by enacting a law that offers liability protection against ransomware and other cyberattacks.


In this week’s podcast, hosts Tony Sager and Sean Atkinson introduce cyber defense as a risk-based process to reduce the overall probability and impact that a cyber-attack will have on an organization.


The Missouri House bill also requires local election authorities to be members of the Center for Internet Security's EI-ISAC.


CIS Controls Version 8 of the CIS Controls, coming May 2021, has made enhancements to progress with modern systems and software.


The frameworks laid out in the bill are well recognized in the cybersecurity community, including NIST, CIS, ISO, and IEC.


Multiple vulnerabilities have been discovered in Cisco Jabber the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR) and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



The CIS Controls are a set of internationally-recognized, prioritized actions that form the foundation of basic cyber hygiene and essential cyber defense.


Information security trends in play offer an opportunity to pivot in order to reduce the resource demands of current security solutions and architectures


Basic cyber hygiene can protect your organization against cyber-attacks. Implementation Group 1 (IG1) of the CIS Controls can show you how!


A vulnerability has been discovered in Adobe ColdFusion, which could allow for arbitrary code execution.



In February 2021, the MS-ISAC observed CryptoWall and Kovter’s return to the Top 10, while Hancitor and Jupyter made their first appearance.


Multiple vulnerabilities have been discovered in F5 products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



1 2 3 4 5 151