Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsView All Resources Ransomware: Who are the Targets? To continue from my last post, who do cybercriminals generally attack with ransomware? A lot…Kip BoyleJune 29, 2020
Podcasts How to quickly and profitably close deals with your cybersecurity intensive customers Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleJune 22, 2020
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityRecent Cyber Attacks Ransomware: Holding Your Data Hostage When you hear the word “malware,” what is your first thought? Probably something along the…Kip BoyleJune 22, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources How is GDPR similar to HIPAA?! We are going to continue off of the previous blog and learn a little more…Kip BoyleJune 16, 2020
Podcasts How to graduate skilled cybersecurity analysts in only six months Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleJune 9, 2020
Company NewsCybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityRecent Cyber AttacksView All Resources The GDPR…What is it? And what can we learn from it? As cybercrime becomes more prevalent, international governing bodies and individual governments have set standards for…Kip BoyleJune 9, 2020
Company NewsCybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityRecent Cyber AttacksView All Resources NIST Cybersecurity Framework Series Part 4 How does the Recovery function benefit the affected organization if they do it well? According…Kip BoyleJune 2, 2020