It has been long known that senior executives of an organization are prime targets for social engineering and phishing attacks. A 2010 CSO article observed: "C-level executives are the juiciest targets for criminals, and they are putting the company at serious risk....read more
Quantum Computing and Encryption. Three Technologies Defining the Future of Information Security and Business – Part I.
This is the first in the series of three articles I will be publishing over the next two weeks. In my Big Three List, AI and blockchain, the two media darlings of the day, play important albeit supporting roles. Today a number of well-known players are engaged in...read more
About 20 years ago, when a floppy disk was a popular type of data storage, business data protection and security strategies were simple: keep one or more spare copies of the data stored on the floppy disks, regularly backup your file servers, and make sure that the...read more