Podcasts Results of annual listener survey Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleMarch 31, 2020
Cybersecurity ThreatsNetwork SecurityPress ReleasesRecent Cyber AttacksView All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 2 What is NotPetya? Last time I talked about the backstory of NotPetya, a string of…Kip BoyleMarch 31, 2020
Network SecurityQuestions & AnswersRecent Cyber AttacksView All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 1 In Light of Covid19 Before I start our newest series I wanted to write a…Kip BoyleMarch 24, 2020
Podcasts Utility computing for cybersecurity is “reasonable” Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleMarch 17, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsSecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 5 This blog post originally published in 2018. Fire, Flood, and Cybersecurity In some respects, cybersecurity…Kip BoyleMarch 17, 2020
Cybersecurity PolicyNetwork SecurityView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 4 In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the…Kip BoyleMarch 10, 2020
Podcasts The effects of cyberattacks on corporate reputation and consumer confidence Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleMarch 3, 2020
Cybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 3 In recent weeks I’ve been talking about the millennial mobster and the reality that savvy…Kip BoyleMarch 3, 2020