Find additional Electroblogs using the search box below.
by Steve Brady
In the wake of the Russian attacks in December and the more recent Colonial Pipeline Ransomware attack, President Biden issued the Executive Order on Improving the Nation’s Cybersecurity. Aimed at strengthening the U.S. government’s cybersecurity posture, the…
by Sutapa Ghadiali
Late 2020 was abuzz with another breaking news story. No, it wasn’t the pandemic or politics. This time, it was the SolarWinds supply chain attack that went undetected for months! SolarWinds is one of the largest network management system software companies…
by KB Mandefro
When it comes to IT audits, it can feel daunting to figure out what documentation is needed. Depending on the audit goal and scope, auditors routinely request supporting documents to validate the effectiveness, efficiency and compliance of Information Technology…
by Amy Reis
During normal (pre-pandemic) times, conferences, trade shows, company and team meetings, and other events happened in person and in various-sized communal meeting spaces. With the COVID-19 pandemic spread, large gatherings were prohibited – requiring the meeting and…
Every organization houses sensitive data. Whether it is employee data, internal operations information, financial data, economic information, intellectual property or international trade secrets, these are all hot commodities for today’s hackers. A cyber-attack can cause catastrophic results.…
by Faraaz Khan
A Blockchain, as the name suggests, is a chain of blocks (i.e., collection of information). The information is contained in blocks, which are linked with each other to form a Blockchain. It is essentially a digital ledger of transactions that is duplicated and…