CEO of IT GOAT, responsible for streamlining IT Operations for our clients by providing outsourced IT Services delivered by IT GOAT. In simple terms, an incident response plan, or IR plan, is the ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
The inevitable finally happened at Howard University on Sept. 3, 2021. Just two weeks into the fall semester, the Washington, D.C., institution was forced to suspend classes in the wake of a ...
Cyber security incidents have transitioned from potential risks to operational certainties. The constant noise of attempted cyber intrusions, security lapses and IT service events requires all ...
Tanya Candia is an international management expert, specializing for more than 25 years in information security strategy and communication for public- and private-sector organizations. State and local ...
Security incidents don’t fail because of a lack of tools; they fail because of a lack of insight. In an environment where ...
The NCIRP was first released in 2016. The updates include pathways for non-federal groups to get involved in responding to devastating cyberattacks. America’s top cyber agency is out with an updated ...
We've been hearing a lot about software supply chain attacks over the past two years, and with good reason. The cybersecurity ecosystem and industry at large have been inundated with warnings about ...
Cyber threats and cyber attacks have increased in frequency and become more sophisticated in the past few years. Industry observers see the threat landscape constantly shifting, with some kinds of ...
Since 2010, Juliana has been a professional writer in the technology and small business worlds. She has both journalism and copywriting experience and is exceptional at distilling complex concepts ...
It is vital to the Institute and its community that any security incident that threatens the security or privacy of confidential information is properly contained, investigated, remedied and ...