What's the Best Way to Communicate After a Data Breach?
So you've had a data breach, and now you need to take the next step. Here's a guide for communicators dealing with security incidents from Ashley Sawatsky of Rootly.
Defiant BlackCat Gang Stands Up New Site, Calls for Revenge Attacks
Ransomware group tries to claw back operations following FBI disruption, and lifts a previous ban on attacks against critical infrastructure in retaliation.
Devices (and ransomware) are everywhere: How endpoint security must adapt
Long gone are the days of the staffer armed with only their work-issued laptop and smartphone. This continues to have a profound impact on how enterprise security teams must handle endpoint security.