Cybersecurity Executive ToolkitCybersecurity ThreatsSecurity Risk AsessmentView All Resources The Federal Trade Commission Versus Wyndham Worldwide In this series of blog posts, I'll be looking at the Federal Trade Commission (FTC)…Kip BoyleJuly 2, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityView All Resources Are Cyber Attacks More Dangerous than Nuclear Attacks? While cyber-attacks cannot kill tens or hundreds of millions of people in a single action,…Kip BoyleJune 25, 2019
Podcasts Company Sues Employee For Being Phished Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice…Kip BoyleJune 25, 2019
Cybersecurity Executive ToolkitNetwork SecuritySecurity Risk AsessmentView All Resources What Worries Cybersecurity Professionals the Most? A top concern is, “do I have a false sense of security?” In other words:…Kip BoyleJune 18, 2019
Cybersecurity Executive ToolkitNetwork SecurityView All Resources Are Xfinity Hotspots Secure? Xfinity hotspots are a brand of public WiFi. And all public WiFi has this in…Kip BoyleJune 11, 2019
Podcasts What the Private Sector Can Learn about Incident Response from the Military Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleJune 11, 2019
View All Resources Should you put real answers to security questions? Never! Set nonobvious answers to your security questions, then store those nonobvious answers in your…Kip BoyleJune 4, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources What are the key topics you would cover in your initial one-hour basic training program on security for non-IT personnel? Q: What are the key topics you would cover in your initial one-hour basic training…Kip BoyleMay 28, 2019
Podcasts The Rise of WebApps and Their Impact on Cybersecurity Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice…Kip BoyleMay 28, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources Can windows malware applications also infect other operating systems such as Linux and Mac? We're continuing in our series of blog posts that cover some of the most common…Kip BoyleMay 21, 2019