cyberattacks Tag

At its most basic level, cyber resilience can be described as not ending up in the media as a victim of some sort of cyberattack or breach. Cyber resilience means not losing operational capability in its varying forms, ranging from a cash shortage due to a...

The Worldwide Threat Assessment of the US Intelligence Community is a report produced by the Office of the Director of National Intelligence (DNI). Based on the intelligence received by the DNI from various intelligence agencies in the United States, the report covers a wide range...

Cybercriminals use many techniques to compromise systems and networks. Some use phishing emails that contain malicious attachments. Others abuse protocols like RDP to access vulnerable systems. And then there are those who leverage online banner ads to prey upon unsuspecting users. How does this last...

Your organization's C-Suite isn't the only target at risk of cyberattacks. Cybercriminals frequently target human resources (HR) departments, with the goal of collecting financial and personally identifiable information (PII). HR departments are not only more likely to have cybersecurity vulnerabilities, but they are also the...