We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more...
Year: 2015
ISACA hosted a free live webinar on how certifications and education get applied to real world e-commerce and governance cybersecurity...
The Wounded Warrior Project’s purpose is to “raise awareness and enlist the public’s aid for the needs of injured service...
This is the tenth in our series of cybersecurity predictions for 2016. Stay tuned for more through the end of...
In October 2015, we discovered a malicious payload file targeting Apple iOS devices. After investigating, we believe the payload belongs...