cybersecurity-news

Streamline Requests for Student Background Checks

Challenge When employers needed a background check on a student, they would receive a complicated PDF form through email or fax from APU. Once the PD...

It Doesn't Pay to Pay: Study Finds Eighty Percent of Ransomware Victims Attacked Again

It doesn’t pay to pay. This advice on ransomware payment is often given, but rarely enumerated. Now it has been. A new study finds that 80% of compa...

Transform: a Perspective – Fleming Shi – RSA22 #4

How surreal it is for the industry to return to RSA event in person... what changed or transformed fundamentally ... etc. Specific impacts around the ...

Experience in the Age of Security – Branden Williams – RSA22 #4

Branden Williams VP, IAM Strategy at Ping Identity Dr. Branden R. Williams has nearly twenty-five years of experience in business, technology, and c...

Going Beyond the Motions of Cybersecurity – Malcolm Harkins – RSA22 #4

Speed, Velocity, and Acceleration. The physics of motion are well documented, and we understand how these scalar and vector quantities differ. In info...

The contractor dilemma: How to address federal supply chain risk – Jon Check – RSA22 #4

Jon Check Director of Cyber Protection Solutions at Raytheon Jon Check is the executive director of Cyber Protection Solutions for Raytheon Intellig...

AccessQuint Access360