Company NewsCybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityRecent Cyber AttacksView All Resources NIST Cybersecurity Framework Series Part 3 What can we learn from Real-Life Examples? Retail giants Target and Home Depot are two…Kip BoyleMay 26, 2020
Company NewsCybersecurity Executive ToolkitQuestions & AnswersView All Resources NIST Cybersecurity Framework Series Part 2 How to Apply NIST Cybersecurity Framework to your Organization Remember, in the last post,…Kip BoyleMay 19, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityQuestions & AnswersView All Resources NIST Cybersecurity Framework Series Part 1 What is NIST? Over the years, some executives that I’ve spoken with have thought that…Kip BoyleMay 12, 2020
Company NewsCybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources Cyber Risk Management and Attorney-Client Privilege Series Part 3 What is ACP? To wrap things up in this series, I’m going to explain how…Kip BoyleMay 5, 2020
Cybersecurity Executive ToolkitCybersecurity PolicySecurity Risk AsessmentView All Resources Cyber Risk Management and Attorney-Client Privilege Series Part 2 The Attorney Work-Product Doctrine Continuing from the last post on attorney-client privilege (ACP), I'd like…Kip BoyleApril 28, 2020
Company NewsCybersecurity PolicyCybersecurity ThreatsView All Resources Cyber Risk Management and Attorney-Client Privilege Series Part 1 What can ACP do for your company? As cybercriminals threaten more and more companies in…Kip BoyleApril 21, 2020
Company NewsCybersecurity Executive ToolkitCybersecurity ThreatsRecent Cyber AttacksView All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 4 Who is the Target? In my previous article on NotPetya, I talked about other targets…Kip BoyleApril 14, 2020
View All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 3 NotPetya Attack affects Ukraine and Russia In my previous posts about NotPetya, I mentioned that…Kip BoyleApril 7, 2020
Cybersecurity ThreatsNetwork SecurityPress ReleasesRecent Cyber AttacksView All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 2 What is NotPetya? Last time I talked about the backstory of NotPetya, a string of…Kip BoyleMarch 31, 2020
Network SecurityQuestions & AnswersRecent Cyber AttacksView All Resources NotPetya- The Exploit that would Lead to Many Attacks Part 1 In Light of Covid19 Before I start our newest series I wanted to write a…Kip BoyleMarch 24, 2020