BreachExchange: by date

319 messages starting Jan 02 18 and ending Mar 30 18
Date index | Thread index | Author index


Tuesday, 02 January

Your “Top Ten” Cybersecurity Vulnerabilities Audrey McNeil
The Disconnect Between Cybersecurity & the C-Suite Audrey McNeil
The ‘Ricochet Effect’ of credential compromise Audrey McNeil
Improved IoT Security Starts with Liability for Companies, Not Just Legislation Audrey McNeil
SEC Plans Cybersecurity Guidance Refresh: What to Expect Audrey McNeil
After Equifax breach, anger but no action in Congress Richard Forno

Wednesday, 03 January

How to protect your workplace from cyber-crime Audrey McNeil
Failed Incident Responses from 2017 Provide Important Case Studies Audrey McNeil
An ounce of ransomware prevention… Audrey McNeil
Cybersecurity Insurance: Breaking Down The Benefits Audrey McNeil
Malware 101: An Overview Of Malware Types Audrey McNeil
2017 Was A Nightmare Year For Security Inga Goddijn

Thursday, 04 January

Meck County Still Restoring Systems After Cyberattack Destry Winant
School District to Spend $314K on Rebuilding Servers after Malware Attack Destry Winant
Penn Medicine computer with patient info stolen Destry Winant

Friday, 05 January

Homeland Security Data Breach Affects 240, 000 Federal Employees, Plus Witnesses and Interviewees Audrey McNeil
Considering storage in your incident response planning Audrey McNeil
Building a program for GDPR compliance: Can you answer these key questions? Audrey McNeil
Ten cyber security trends for organizations to consider Audrey McNeil
Are Small Hospitals More Vulnerable to Data Breaches? Audrey McNeil
Protecting Your Business In 2018’s IT Landscape Audrey McNeil

Monday, 08 January

Two Hong Kong travel agencies apologise as hackers demand payment for stolen customer data Audrey McNeil
Uber's Biggest Mistake: It Wasn't Paying Ransom Audrey McNeil
5 IT Security Trends to Watch in 2018 Audrey McNeil
The Stakes for Protecting Personally Identifiable Information Will Be Higher in 2018 Audrey McNeil
4 Most Important Security Factors Every Company Should Consider Audrey McNeil
Casting an eye on the 2018 cyber landscape Audrey McNeil

Tuesday, 09 January

The new DHS breach illustrates what's wrong with today's cybersecurity practices Audrey McNeil
The 5 Motives of Ransomware Audrey McNeil
2018: A Cybersecurity Preview Audrey McNeil
Intelligent defence in the era of global distributed cyber-crime Audrey McNeil
Deception will be the security watchword of 2018 Audrey McNeil
How To Ensure A Robust Cyber Security Ecosystem For Your Business Audrey McNeil

Wednesday, 10 January

Toymaker VTech Settles FTC Privacy Lawsuit For $650, 000 Audrey McNeil
Malware-infected beauty shop hadn’t backed up data in 2 years Audrey McNeil
Analysis: Security Elements of 'Trusted Exchange Framework' Audrey McNeil
Reacting to a big breach Audrey McNeil
5 things healthcare organizations need to consider before embracing BYOD Audrey McNeil
Data Breaches Plague Organizations for Years Audrey McNeil

Thursday, 11 January

Ohio man indicted for creating malware to spy on Americans for 13 years Destry Winant
Hackers could steal from shipping companies by diverting cargo payments Destry Winant
Sask. Health Authority sends more private health info to computer shop, says frustrated owner Destry Winant

Friday, 12 January

Five trends to watch out for in cybersecurity Audrey McNeil
Don't forget to go the 'last mile' on cybersecurity initiatives Audrey McNeil
People, Passwords, And Patches: Fixing The Basic Flaws In Your Security System Can Be Easier Than You Think Audrey McNeil
Working Smarter, Not Harder: Bridging the Cyber Security Skills Gap Audrey McNeil
The year ahead in cybersecurity law Audrey McNeil
17 Things We Should Have Learned in 2017 But Probably Didn't Audrey McNeil

Monday, 15 January

Major IT Security Lessons Learned From 2017 Audrey McNeil
Warren, Warner propose 'massive' fines for breaches at credit bureaus Audrey McNeil
What Are Your 2018 Cybersecurity Intentions? Audrey McNeil
Past and Present Tactics of Ransomware Attacks Audrey McNeil
Assuring Security in a Hyper-connected World Audrey McNeil
Why 2018 could be the year cyber-security finally comes of age Audrey McNeil

Tuesday, 16 January

Cybersecurity Concerns on the Horizon for 2018 Audrey McNeil
Protecting your company from cyber threats starts with C-level executives Audrey McNeil
These simple steps will help guard your invaluable business data Audrey McNeil
Who's the best target for cyber cover? Audrey McNeil
Safe and Sound: 7 Strategies on How Young Startups Can Protect Their Digital Assets Audrey McNeil
How Financial Services Firms Can Overcome Security Concerns Audrey McNeil

Wednesday, 17 January

Security Game Plan for Smart Factories Audrey McNeil
6 reasons you’re failing to focus on your biggest IT security threats Audrey McNeil
The evolving threat landscape: nation state, third party attacks and cyber vandalism Audrey McNeil
Who should be responsible for cybersecurity? Audrey McNeil
Learning to live left of breach Audrey McNeil

Thursday, 18 January

Cyber-attacks are a top three risk to society, alongside natural disaster and extreme weather Destry Winant
Business needs to reduce cyber threat to payment card data Destry Winant
CT Supreme Court Rules Patients Can Sue Over PHI Disclosure Destry Winant

Friday, 19 January

Norwegian health authority hacked, patient data of nearly 3 million citizens possibly compromised Audrey McNeil
Five Dangerous Healthcare Cybersecurity Myths Audrey McNeil
Managing Intelligence: Get the Right Threat Data, Not All the Threat Data Audrey McNeil
Insider threats: Suffering from the detective's curse Audrey McNeil
Cyber Expert Shortage Leaves Networks Vulnerable Audrey McNeil

Monday, 22 January

Understanding Supply Chain Cyber Attacks Audrey McNeil
$17.2 Million Settlement for Breach Case Involving HIV Info Audrey McNeil
Smartphone maker OnePlus hit by credit card security breach Audrey McNeil

Tuesday, 23 January

Mental Models & Security: Thinking Like a Hacker Audrey McNeil
Responding in the Wake of a Cyberattack Audrey McNeil
User lock-down or education? Cybersecurity issues in a rapidly evolving landscape Audrey McNeil
Insider Threat Programs: A Beginner’s Guide Audrey McNeil

Wednesday, 24 January

Hacker steals data from up to 100, 000 Bell Canada customers in second breach in eight months Audrey McNeil
Behavioral biometrics missing from cybersecurity Audrey McNeil
Paying for a HIPAA Breach: Cyber Insurance Covering Audrey McNeil
5 ways to avoid Shadow IT Audrey McNeil
GDPR is coming this May: How should your business prepare? Audrey McNeil
Protecting Physician Practices From Cybertheft Takes More Than A Do-It-Yourself Approach Audrey McNeil

Thursday, 25 January

Alleged North Korean hack on Metrolinx may open ‘frightening new chapter’ in cybersecurity Destry Winant
Online Advertising: Hackers' Little Helper Destry Winant
Employers Can Be Vicariously Liable for Employee Data Breaches Destry Winant
SpriteCoin cryptocurrency ransomware spy on user, steal saved passwords Destry Winant
Dark Web markets selling babies' Social Security numbers, personal data and mothers' maiden names Destry Winant

Friday, 26 January

Cyber threats: 2018 and beyond Audrey McNeil
Maersk Reinstalled 45, 000 PCs and 4, 000 Servers to Recover From NotPetya Attack Audrey McNeil
Five Goals Business Leaders Must Set For Increased Security In 2018 Audrey McNeil
2017: The Year of Email Data Breaches Audrey McNeil
Hospitals – Ransomware targets Audrey McNeil
What Precedent Will Be Set in CareFirst Data Breach Case? Audrey McNeil

Monday, 29 January

Australia - Asylum seekers invited by OAIC to speak out about data breach Audrey McNeil
Allscripts faces class-action lawsuit after SamSam attack Audrey McNeil
Canada - Number of class actions involving data breaches steadily increasing Audrey McNeil
Best 5 ways you can protect yourself from phishing attacks Audrey McNeil

Tuesday, 30 January

Trade Secrets: Securing Your Hidden Intellectual Property Audrey McNeil
Strava’s privacy PR nightmare shows why you can’t trust social fitness apps to protect your data Audrey McNeil
Health Data Breach Tally Update: A Puzzling Omission Audrey McNeil
Hackers are con artists: The perils of social engineering Audrey McNeil
How SMBs can better protect themselves against the rising tide of cyber security threats Audrey McNeil

Wednesday, 31 January

Top Tips For Data Security In 2018 Audrey McNeil
Why Your Employees' Compromised Credentials Endanger Your Organization Audrey McNeil
ISU professor warns of the threat of data breach fatigue Audrey McNeil

Thursday, 01 February

Incident response plans must be tested, privacy conference warned Audrey McNeil
How Healthcare Organizations Can Reduce Cyber Extortion Risk Audrey McNeil
Lessons from the five biggest data breaches of 2017 Audrey McNeil
Diverting Employees’ Payroll Direct Deposits: The Latest Wave of Phishing Scams Audrey McNeil
Australia: Urgent probe launched into accidental sale of classified documents Audrey McNeil

Monday, 05 February

Most Threatening DNS Security Risks And How To Avoid Them Audrey McNeil
Former KU student accused of computer hacking faces 18 felony charges Destry Winant
Employer Liability For Data Breaches: Avoid Getting Eaten By Your Own Audrey McNeil
Does Your Company Need Cybersecurity Insurance? Audrey McNeil
Are You Prepared? Five questions to ask about your company’s data security protections Audrey McNeil

Tuesday, 06 February

What is microsegmentation? How getting granular improves network security Destry Winant
Tips for C-level employees when managing IT security risks Audrey McNeil
Cybersecurity Threats in the Age of IoT Audrey McNeil
Securing your company culture Audrey McNeil
New Ransomware seeks to destroy your business Audrey McNeil
Security Think Tank: Approaches to strengthening security operations Audrey McNeil

Wednesday, 07 February

Over 5, 200 Data Breaches Make 2017 An Exceptional Year For All The Wrong Reasons Inga Goddijn
Data Privacy Has Become a Bigger Blip on the CCO Radar Audrey McNeil
When the cyber attack comes, will you be prepared? Audrey McNeil
You're the IT worker in charge of securing the cloud for your company. Welcome to Hell Audrey McNeil
Protecting your business from the scourge of ransomware Audrey McNeil
3 Ways You Can Mitigate Man-in-the-Middle Attacks Audrey McNeil

Thursday, 08 February

Mind the Gap: This Researcher Steals Data With Noise, Light, and Magnets Destry Winant
Cyber insurance could be credit negative for insurers: Fitch Destry Winant
Six ways by which hackers can crack your password Destry Winant
Adobe Issues Emergency Fix to Foil North Korean Hackers Destry Winant

Friday, 09 February

Apple’s iOS iBoot Source Code For iPhone Leaked Online Audrey McNeil
What to Know About ED's New Stance on Data Breach Reporting Audrey McNeil
The Big Question in *Waymo v. Uber*: What on Earth Is a Trade Secret, Anyway? Audrey McNeil
Ransomware Wreaks Havoc in 2017 Audrey McNeil
CISOs Wary Of Threat Intelligence Accuracy, Quality: Study Audrey McNeil
4 Factors to Consider When Calculating the Cost of a Data Breach Audrey McNeil

Monday, 12 February

Malware hides as LogMein DNS traffic to target point of sale systems Inga Goddijn
Average Canadian company faces $3.7 million in cyber exposure Inga Goddijn
7 GDPR Requirements You Need to Know Inga Goddijn
Are you ready for data breach notification laws? Inga Goddijn
Sacramento Bee Leaks 19.5 Million California Voter Records, Promptly Compromised by Hackers Inga Goddijn
A (Secondary) Education in Data Security Audrey McNeil

Tuesday, 13 February

Business Cybersecurity Strategy Audrey McNeil
Equifax Confirms 'Probable' Breached Data Was Indeed Stolen Audrey McNeil
Top 5 Ways to Reduce the Cost of a Data Breach Audrey McNeil
Why the 2018 Winter Olympics Are the Perfect Storm for Cyberattacks Audrey McNeil
After the sudden end of a dramatic trial, the key takeaways from Waymo v Uber Audrey McNeil

Wednesday, 14 February

So, What is a Data Privacy Impact Assessment and Why Should Organizations Care? Audrey McNeil
GDPR: The Compliance Conundrum Audrey McNeil
What Keeps a CTO Up at Night Audrey McNeil
Real Estate Industry Has A ‘False Sense Of Security’ When It Comes To Cyber Safety Audrey McNeil
Cybersecurity is 'greatest concern' at Senate threats hearing Audrey McNeil
While Western Union wired customers' money, hackers transferred their personal info Audrey McNeil

Thursday, 15 February

Russian Gets 12 Years in U.S. Prison for Role in Hacking Scheme Audrey McNeil
$100, 000 Fine in Case Involving Defunct Records Storage Firm Audrey McNeil
Seattle ICE attorney charged with stealing immigrants' identities Audrey McNeil
The strange case of the data breach that stayed online for a month Audrey McNeil
Data breach fatigue requires better response planning Audrey McNeil
How To Keep Your New Online Business Safe Audrey McNeil

Friday, 16 February

7,900 Vulnerabilities In 2017 You Aren’t Aware Of May Put Your Organization At Risk Inga Goddijn
Maine attorney general reviews Portland survey of HIV patients for privacy violations Audrey McNeil
Three Lessons from the Conviction of Sinovel Wind Group for Trade Secret Theft Audrey McNeil
Planning for the Perilous Consequences of a Data Breach Audrey McNeil
The preparations you need to make ahead of GDPR Audrey McNeil
This one business file is most used in cyberattacks Audrey McNeil

Monday, 19 February

Cybercrime Gang Ramps up Ransomware Campaign Destry Winant
A Hacker Has Wiped a Spyware Company’s Servers—Again Destry Winant
Insurance for Cybersecurity Incidents and Privacy Breaches Audrey McNeil
Impact of Data Protection Legislation Audrey McNeil
Cybersecurity and Insurers Audrey McNeil

Tuesday, 20 February

These data security challenges are plaguing the healthcare industry Audrey McNeil
How to be compliant with data breach notification laws Audrey McNeil

Wednesday, 21 February

A Hacker Has Wiped a Spyware Company’s Servers—Again Audrey McNeil
Consequences of the Late Announcement of Cyber-security Incidents Audrey McNeil
Taking cybersecurity beyond a compliance-first approach Audrey McNeil
Is US Computer Crime Justice Draconian? Audrey McNeil

Thursday, 22 February

FTC Report Finds Some Small Business Web Hosting Services Could Leave Small Businesses at Risk of Facilitating Phishing Scams Inga Goddijn
Amazon AWS Servers Might Soon Be Held for Ransom, Similar to MongoDB Destry Winant
10 reasons not to innovate your cyber security Destry Winant
FlightSimLabs admits to installing malware on users’ PCs Destry Winant
Sinovel Wind Group found guilty of IP theft valued at $800 million Destry Winant

Friday, 23 February

Hacking is a booming business, and it’s time for a disruption Audrey McNeil
5 Ways Hackers Can Breach Your Company Undetected Audrey McNeil
Learning Lessons From The 5 Biggest Data Breaches Of 2017 Audrey McNeil
When Obscurity Is Not a Defense Audrey McNeil
How Can 73 Percent of Companies Not Be Prepared for Hackers? Audrey McNeil
Getting cyber security right Audrey McNeil

Monday, 26 February

Cyber security in 2018: Lessons from the past Audrey McNeil
Encryption – The good and the bad Audrey McNeil
Australia: Security is not a dirty word Audrey McNeil
What Do We Know About Hospital Data Breaches? Audrey McNeil
Why antivirus practices should never be allowed to stagnate Audrey McNeil
Yogurt Wars Escalate as Dannon Sues Executive Who Jumped to Chobani Audrey McNeil

Tuesday, 27 February

SEC Expands Cybersecurity Guidance: All Public Companies Must Take Note Audrey McNeil
How to make sense of the changing data legal landscape, from state laws to GDPR Audrey McNeil
Australia: Data breach notification scheme no ‘armageddon’ Audrey McNeil
Security’s Challenge in the Highly-Regulated Health Care World Audrey McNeil
Three steps MSPs must take to become GDPR compliance experts Audrey McNeil
Gather round folks, it's time to talk Security Integrity Audrey McNeil

Wednesday, 28 February

Don't Miss These 5 Cybersecurity Trends in 2018 Audrey McNeil
How Will Your Employees Get You Hacked? Audrey McNeil
Covert 'Replay Sessions' Have Been Harvesting Passwords by Mistake Audrey McNeil
Liability at the Stroke of a Computer Key: Cyberattackers Take Aim at Employees Audrey McNeil
Small Business IT: Starting Off on the Right Foot Audrey McNeil

Thursday, 01 March

Major data breach at Marine Forces Reserve impacts thousands Destry Winant
Aliens Can Hack Earth’s Computers – No, Is Not A Sci-Fi Scenario But The Theories Scientists Have Recently Elaborated Destry Winant
Nuance says NotPetya attack led to $98 million in lost revenue Destry Winant
Companies must take cyber security more seriously than before Audrey McNeil
'Without reasonable delay' — How security breach reporting is evolving in government Audrey McNeil

Friday, 02 March

3 Ways State and Local Agencies Can Form a Risk-Based Security Strategy Audrey McNeil
Is Your Business Vulnerable to a Cyberattack? Audrey McNeil
Are Your Employees Putting Your Organisation at Risk? Audrey McNeil
The most notorious hacks in history, and what they mean for the future of cybersecurity Audrey McNeil
The Best & Worst Practices of Incident Response Audrey McNeil

Monday, 05 March

Major data breach at Marine Forces Reserve impacts thousands Richard Forno
9 Tips for Improving Your Incident Response Strategy Audrey McNeil
The Role of a Data Protection Officer under GDPR Audrey McNeil

Tuesday, 06 March

Password Guidance Can Dramatically Improve Account Security Audrey McNeil
Costs of Equifax data breach now pinned at $439m Audrey McNeil
How agencies should respond to shorter breach reporting statutes Audrey McNeil
Dealing with National & Medical Security Breaches: How to Prepare the Front Lines of Cybersecurity Audrey McNeil
Meltdown and Spectre – The Gifts That Keep On Giving Inga Goddijn
How to improve your security infrastructure when you’re on a budget Audrey McNeil

Wednesday, 07 March

Applebee’s Hit by POS Malware Audrey McNeil
The Best Defense: If You’re Worried About Cybersecurity, Call an Attorney Audrey McNeil
The dos and don'ts of a successful incident response program Audrey McNeil
5 Website Security Myths You Should Know About Audrey McNeil

Thursday, 08 March

Nike website vulnerability leaked server login passwords and more Destry Winant
1 in 5 health employees willing to sell confidential data: 7 survey insights Destry Winant
Medical device company criticized for lax response to hacking vulnerability Destry Winant
Second Ransomware Round Hits Colorado DOT Destry Winant
Human Predictability Make Attacks Easy For Threat Actors Audrey McNeil

Friday, 09 March

ISOC: Operationalizing Threat Intelligence Audrey McNeil
5 Signs It’s Time to Replace Your Endpoint Security Solution Audrey McNeil
Banks battle retailers over proposal to disclose consumer hacks Audrey McNeil
Internet of Things: How Cybersecurity Will Change Audrey McNeil
Understanding GDPR’s Breach Disclosure Starts with Who Owns PII Audrey McNeil
Five Privacy Practices Every Company Should Address in the Wake of the FTC’s Enforcement Action against PayPal Audrey McNeil

Monday, 12 March

Corporate boards will face the spotlight in cybersecurity incidents Audrey McNeil
Are you taking care of business? Your cybersecurity to-do list Audrey McNeil
Information security: 5 ways to better protect your company Audrey McNeil
How to Secure Your Data, Network and Employees Remotely Audrey McNeil

Tuesday, 13 March

Senate rewards Equifax despite privacy breaches Richard Forno
Judge Allows Much Of Yahoo Breach Suit To Go Forward Audrey McNeil
How FDIC rebounded from major cyber incidents Audrey McNeil
Are your employees unwittingly invalidating your cyber liability insurance? Audrey McNeil
Employee Training: A Security Priority For Financial CISOs Audrey McNeil

Wednesday, 14 March

How to Improve Federal Cybersecurity Efforts Audrey McNeil
A step through guide on how to mitigate a cyber-attack Audrey McNeil
The High Cost of Data Breaches: Six Examples From 2017 Audrey McNeil
The Changing Role of Healthcare IT and Why It Requires Automation Audrey McNeil
Insuring Your Business Against Social Engineering Fraud Audrey McNeil

Thursday, 15 March

How IT Support Can Determine The Growth Of A Small Business Audrey McNeil
The Growing Ransomware Threat and Trends Audrey McNeil
GDPR Compliance: 10 Tips for Employers Audrey McNeil

Friday, 16 March

5 Ways to Improve Insider Threat Prevention Audrey McNeil
Law firm at centre of Panama Papers leak to close down Audrey McNeil
Feds Accuse Equifax CIO Pick Of Insider Trading Audrey McNeil
Compliance Managers, Know What’s Happening in Your Midst! Audrey McNeil
Best of breed: how secure are you, really? Audrey McNeil
Artificial Intelligence is the Answer to Retail’s Cyber Threats Audrey McNeil

Monday, 19 March

Realistically avoiding a security breach 101 Audrey McNeil
Govt gets over 30 data breach notifications in three weeks under new disclosure laws Audrey McNeil
Top 6 Quickest Ways to Draw a GDPR Fine Audrey McNeil
The First 48 Hours - How to Respond to a Data Breach Audrey McNeil
Securing the Insecure: Security Challenges Posed by the Internet of Things Audrey McNeil
Unsecured AWS S3 bucket managed by Walmart jewelry partner exposes data of 1.3M customers Richard Forno

Tuesday, 20 March

Leveraging analytics to improve security Audrey McNeil
Advanced Phishing Threat Protection Requires Security at the Mailbox Level Audrey McNeil
How to avoid legacy IT costing your business more than money Audrey McNeil
The Cambridge Analytica Debacle is not a Facebook “Data Breach.” Maybe It Should Be. Audrey McNeil
Four Ways Technology Has Made It Easier to Uphold HIPAA Audrey McNeil
Building a digital defense against W-2 theft Audrey McNeil

Wednesday, 21 March

Orbitz hack exposed data of 880, 000 customers in 2016 and 2017 Audrey McNeil
Bug Bounty Programs – your company’s friend or foe? Audrey McNeil
The 3 Scariest Security Blind Spots in SaaS Environments and Why They Exist Audrey McNeil
When an IT manager falls victim to a phish Audrey McNeil
Fat Data: Get the skinny on GDPR and test data management Audrey McNeil

Thursday, 22 March

Charities Are Vulnerable To Severe Cyber Attacks Audrey McNeil
What All Employers Need to Know About Protecting Employee Health Information Destry Winant
Timeline: Facebook becomes the Uber of 2018 Audrey McNeil
The Biggest Data Breach of 2017 and Why it Matters to Even the Smallest Law Firms Audrey McNeil
Patient details in the recycling? Hospitals should cut down on paper to protect privacy: study Audrey McNeil

Friday, 23 March

Lessons for Boards from Yahoo’s $80 Million Data Breach Settlement Audrey McNeil
Canada Moves to Mandatory Breach Notification Guidelines Audrey McNeil
Does Patching Make Perfect? Audrey McNeil
You’re too busy to get your security right Audrey McNeil
The future of computer security is machine vs machine Audrey McNeil
How to Survive an Accidental Emailing Crisis Audrey McNeil

Monday, 26 March

10 tips for agencies looking to address cyber threats Audrey McNeil
GDPR threats: how to mitigate data exfiltration exploits Audrey McNeil
The Financial Fallout From Data Breaches Audrey McNeil
5 Tips to Overcome Big Data Security Issues Audrey McNeil
The Soaring Success of Cybercrime as a Company Audrey McNeil
Using New Techniques To Combat Cyber Threats Audrey McNeil

Tuesday, 27 March

What Does the GDPR Consider to be a Data Breach? Audrey McNeil
4 Ways Every Employee Can Play a Role in Their Company’s Security Audrey McNeil
Security as a Top Priority in the IoT Era Audrey McNeil

Wednesday, 28 March

Why Innovative Health IT Designs Must Consider Security First Audrey McNeil
A Look At Healthcare IT Trends Audrey McNeil
What chief data officers can learn from Facebook about building better big data security practices Audrey McNeil
Are threats and recriminations an effective method for encouraging cybersecurity? Audrey McNeil
Four strategies organisations are using to combat cyber attacks Audrey McNeil

Thursday, 29 March

‘Secure by Design’: why are so many businesses failing? Destry Winant
Improve information security by giving employees options Destry Winant
Atlanta was warned about vulnerabilities months before cyberattack, audit shows Destry Winant
Why Does Data Exfiltration Remain an Almost Unsolvable Challenge? Audrey McNeil
Overcoming today's risks and tomorrow's threats with confidence Audrey McNeil

Friday, 30 March

Preventing the Next Ransomware Attack Audrey McNeil
What might bug bounty programs look like under the GDPR? Audrey McNeil
Boeing production plant hit with WannaCry ransomware attack Audrey McNeil
Think unconventionally to mitigate risk Audrey McNeil
Getting Your Staff to Take Cybersecurity Seriously Audrey McNeil
We're Only Human: Why Business Email Compromise Scams Still Work Audrey McNeil