Find additional Electroblogs using the search box below.
by Eric Wesley
In the security operations space, SOAR stands for security orchestration, automation and response. The flexible technology can use a stack of compatible software programs to help organizations manage security threats, respond to security events and automate…
by Steve Brady
In the wake of the Russian attacks in December and the more recent Colonial Pipeline Ransomware attack, President Biden issued the Executive Order on Improving the Nation’s Cybersecurity. Aimed at strengthening the U.S. government’s cybersecurity posture, the…
by Sutapa Ghadiali
Late 2020 was abuzz with another breaking news story. No, it wasn’t the pandemic or politics. This time, it was the SolarWinds supply chain attack that went undetected for months! SolarWinds is one of the largest network management system software companies…
by KB Mandefro
When it comes to IT audits, it can feel daunting to figure out what documentation is needed. Depending on the audit goal and scope, auditors routinely request supporting documents to validate the effectiveness, efficiency and compliance of Information Technology…
by Amy Reis
During normal (pre-pandemic) times, conferences, trade shows, company and team meetings, and other events happened in person and in various-sized communal meeting spaces. With the COVID-19 pandemic spread, large gatherings were prohibited – requiring the meeting and…
Every organization houses sensitive data. Whether it is employee data, internal operations information, financial data, economic information, intellectual property or international trade secrets, these are all hot commodities for today’s hackers. A cyber-attack can cause catastrophic results.…