In today’s digital age, NGOs face a unique and evolving set of cyber security threats that can jeopardize their missions and operations. Join Chelsea Conard, Dianna Langley, Ian Gottesman, and Alexandru Lazar for this webinar, “Guardians of Good: Fortifying NGO Cyber Defenses,” as they discuss a comprehensive overview of the… Read More
The US government has issued a warning that Chinese cyber actors are trying to gain access to US critical infrastructure networks. In most cases, access to these networks would not provide intelligence information; instead, the intent is to be able to hold US critical infrastructure at risk in the event… Read More
- Post Type
- Blog
- Category
- Webinar
The US government has issued a warning that Chinese cyber actors are trying to gain access to US critical infrastructure networks. In most cases, access to these networks would not provide intelligence information; instead, the intent is to be able to hold US critical infrastructure at risk in the… Read More
The US government has adopted an array of new cyber policies and published a National Cybersecurity Strategy over the past few years. Collectively, these policies signal a significant shift in how the Federal government is approaching cybersecurity. Instead of relying primarily on individual organizations to take voluntary measures, the updated… Read More
- Post Type
- Blog
- Category
- Webinar
The US government has adopted an array of new cyber policies and published a National Cybersecurity Strategy over the past few years. Collectively, these policies signal a significant shift in how the Federal government is approaching cybersecurity. Instead of relying primarily on individual organizations to take voluntary measures, the updated… Read More
Many emerging technologies, from artificial intelligence to quantum computing to synthetic biology, involve computational systems and are vulnerable to manipulation by malicious actors. Our experience with the IT and internet revolutions of the late 20th and early 21st centuries demonstrates that we need to integrate security into these technologies from the beginning,… Read More
- Post Type
- Blog
- Category
- Webinar
Many emerging technologies, from artificial intelligence to quantum computing to synthetic biology, involve computational systems and are vulnerable to manipulation by malicious actors. Our experience with the IT and internet revolutions of the late 20th and early 21st centuries demonstrates that we need to integrate security into these technologies… Read More
Claims about AI tend toward the extremes. Either it’s the technology that will finally usher in the Golden Age of IT or it signals the end humanity and the rise of the machines. While neither extreme is likely, most organizations are grappling with this technology and the claims that the… Read More
- Post Type
- Blog
- Category
- Webinar
Claims about AI tend toward the extremes. Either it’s the technology that will finally usher in the Golden Age of IT or it signals the end humanity and the rise of the machines. While neither extreme is likely, most organizations are grappling with this technology and the claims that… Read More
While down from its high-profile peak in 2021, ransomware remains a serious threat to businesses, non-profits, and governments. As organizations increase their resilience to ransomware attacks focused on data encryption, malicious actors are employing tactics like data dumping, harassment, denial of service attacks, and other techniques to get victims to… Read More
- Post Type
- Blog
- Category
- Webinar