
See Bill Frank’s biography and contact information at the end of this article. This article is Part Two of my series on managing cyber-related business risks. In Part One, I…
See Bill Frank’s biography and contact information at the end of this article. This article is Part Two of my series on managing cyber-related business risks. In Part One, I…
Imagine this: you’re a security analyst on the frontlines of your organization’s cybersecurity team. You stare at your monitor as alerts flood from various security programs, like alarms all going…
Bad actors are waging increasingly sophisticated and frequent attacks””including ransomware, cyber espionage, zero-day malware and fileless attacks””to exploit endpoint vulnerabilities. These rapid-fire, diverse attacks are generating an average of 11,000…
As business leaders outside of IT continue accepting cybersecurity as a business strategy rather than just as a digital defense mechanism, there are still major vacancies in the cybersecurity personnel…
The advent of 2024 opens a new era, spotlighting the significant strides in cloud adoption and digital transformation that organizations have dramatically pushed forward, some by as much as six…
See Bill Frank’s biography and contact information at the end of this article. [Note: This is an updated version of the original article posted on March 21, 2024. I replaced…
In the modern healthcare ecosystem, data plays a critical role. From storing patient records and managing finances to facilitating research and developing treatment plans, this information forms the lifeblood of…
Inside our IT bubble, leaders are aware of the cybersecurity skills shortage that plagues enterprises. As concerning as this challenge is, it may come as a surprise to the general…
As customer expectations and operational challenges change, retailers need to transform their business goals accordingly. Cloud-based technologies, like software-as-a-service (SaaS) applications, offer flexibility, scalability, and efficiency to facilitate this transformation….
As threat actors get more sophisticated and aggressive campaigns become more commonplace, it is imperative that corporations step up their game. In the age of artificial intelligence (AI), machine learning…