Ransomware is a topic that regularly comes up when I speak to CISOs and information security leaders, understandably so as recent reports have highl...
There is no precedence to the unconscionable way hackers exploit human distress during these times. Albeit a few hacker groups “swore” on paper they...
In legal terms, the process of transferring evidence from one place to another is handled in a vigilant manner - the chain of custody. The purpose i...
Think like a hacker. It seems so obvious but you might be surprised to hear that most cyber security professionals were taught to think about cyber ...