What's the Best Way to Communicate After a Data Breach?
So you've had a data breach, and now you need to take the next step. Here's a guide for communicators dealing with security incidents from Ashley Sawatsky of Rootly.
Defiant BlackCat Gang Stands Up New Site, Calls for Revenge Attacks
Ransomware group tries to claw back operations following FBI disruption, and lifts a previous ban on attacks against critical infrastructure in retaliation.
Devices (and ransomware) are everywhere: How endpoint security must adapt
Long gone are the days of the staffer armed with only their work-issued laptop and smartphone. This continues to have a profound impact on how enterprise security teams must handle endpoint security.
Terminated IT manager pleads guilty in network attack of former employer
Former New Jersey public high school IT manager Conor LaHiff has entered a guilty plea for hacking the school's Apple and IT administrator accounts to disrupt its operations in retaliation to his termination in June, reports BleepingComputer.