- other
- artificial intelligence
- cloud security
- data analytics
- ransomware attacks
- hot security themes
- hot security trends
- phishing schemes
- security skills gap
- 2021 cybersecurity trends
- user training
- Cybersecurity
- phishing
- other
- ransomware attacks
- ransom payments
- JBS
- Colonial Pipeline
- Blackbaud
- DarkSide
- NetWalker
- data backup
- ransomware gangs
- Kaseya
- Magellan
- REvil
- OFAC sanctions
- other
- ethical hacking
- vulnerability assessment
- penetration testing
- pen testing
- clear box testing
- external pen test
- internal vulnerability test
- cybersecurity testing
- white box testing
- black box testing
- grey box testing
- pen tests
- internal pen test
- external vulnerability scan
- white hat hacking
- other
- PII
- HIPAA Privacy Rule
- gdpr
- Personally Identifiable Information
- privacy risk assessment
- privacy impact assessment
- NIST privacy framework
- GLBA privacy rule
- privacy act of 1974
- e-government act
- social engineering
- other
- artificial intelligence
- machine learning
- fake news
- video rewrite program
- deepfake
- deepfake exploits
- deepfake attacks
- deepfake laws
- NDAA
- voice phishing
- synthesizing obama
- email security
- other
- employee security training
- website security
- email surveys
- customer surveys
- free-gift offers
- security training
- loyalty programs
- customer reward programs
- online surveys
- #multifactor authentication
- other
- artificial intelligence
- machine learning
- e-commerce websites
- natural language processing
- chatbot platforms
- website security
- behavioral analytics
- customer service applications
- AI Chatbots
- data encryption
- chat security standards
- ransomware
- phishing
- social engineering
- other
- CISA
- employee security training
- trojan malware
- FBI
- smbv1
- Trickbot
- spearphishing
- spoofed email
- malicious javascript
- PCI compliance
- other
- prevent e-skimming
- e-commerce applications
- online payment form
- credit card data theft
- employee security training
- e-skimming
- javascript sniffing
- e-commerce websites
- e-commerce volume
- e-tailers
- online checkout
- other
- CMMC Compliance
- supply chain security
- NIST 800-171
- controlled unclassified information
- Executive Order 13556
- 32 CFR Part 2002
- CUI
- CUI program
- federal contractor compliance
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
July, 20 2021
Experts agree that these are three of the hottest themes in cybersecurity this year. Hot Theme 1: Raising User[…]
July, 13 2021
Cybercriminal gangs have propelled ransomware a giant leap forward and taken their profits to unprecedented heights.
June, 29 2021
Which Is Right For You, and Why? When businesses, healthcare providers, educational institutions, and government[…]
June, 22 2021
Here’s Why, Here’s How Any business that has customers. Any healthcare provider who has patients. Any professional who[…]
June, 15 2021
How Your Business Could Be Affected, and What You Should Do In a haunting song aptly titled “Magic,” Bruce Springsteen[…]
June, 8 2021
Beware the Free Gift Who doesn’t love the promise of a free gift after buying something online? How about a gift card[…]
May, 18 2021
Most of us are familiar with chatbots, those robotic chat features that pop up on websites to answer questions or solve[…]
May, 11 2021
FBI Recommends These Immediate Actions TrickBot may sound like an engaging name for an impish bit of cyber play, but[…]
May, 4 2021
Steps You Can Take Now To Strengthen Security The FBI has recently announced amped-up exploitation of e-commerce[…]
April, 20 2021
As of Nov 2021, CMMC 2.0 was introduced and the information below may not apply in its entirety. Two Major Compliance[…]