What's the Best Way to Communicate After a Data Breach?
So you've had a data breach, and now you need to take the next step. Here's a guide for communicators dealing with security incidents from Ashley Sawatsky of Rootly.
Defiant BlackCat Gang Stands Up New Site, Calls for Revenge Attacks
Ransomware group tries to claw back operations following FBI disruption, and lifts a previous ban on attacks against critical infrastructure in retaliation.
Managing API Contracts and OpenAPI Documents at Scale
See how Cisco DevNet discussed how to build and publish robust APIs, managing API contracts and OpenAPI documents at scale, and the challenges that come with the lifecycle management of OpenAPI documents.
Devices (and ransomware) are everywhere: How endpoint security must adapt
Long gone are the days of the staffer armed with only their work-issued laptop and smartphone. This continues to have a profound impact on how enterprise security teams must handle endpoint security.