Security Control Gaps Are Not Risks

Based off Randall “Fritz” Frietzsche LinkedIn post results, it’s worthy to note that many cyber security individuals are still expressing confusion when it comes to security risk analysis and GAP anal… Read More

Incident Of The Week: UW Medicine Patient Data Exposed Online

UW Medicine is sending letters to 974,000 patients about a data breach that exposed some of their information on the internet. Read More

Latest In Cyber Security News Part 2: Where’s The Equifax Data?

Continuing the conversation in Episode #72 of Task Force 7 Radio, Host George Rettas and Co-Host Tom Pageler, discuss one of the great mysteries in cyber security over the last year: What happened to… Read More

Boost Multi-Factor Authentication With A Blended-Defense Strategy

Since the dawn of the password, technology has evolved faster and faster as each year goes by, making security education and awareness even more crucial for consumers and employees alike. Read More

Driving A Cyber Security Culture Into The Business

In today’s dynamic and real-time world, you should not have to go the extra mile to justify to senior executives to buy into the value of cyber security. Believe it or not, some managers still believe… Read More

Incident Of The Week: Dunkin’ Donuts Reports Credential Stuffing Attack

Dunkin’ Donuts first reported a credential stuffing attack at the end of November last year, and is now notifying users of more account breaches following a new attack. Read More

Member Spotlight: Dr. Luis O. Noguerol, US Dept. Of Commerce, NOAA, Federal Gove…

Dr. Luis O. Noguerol is currently the Information System Security Officer for the U.S. Department of Commerce – NOAA – Federal Government, as well as an Adjunct Professor at Miami Dade College. Read More

Tackling The Latest Cyber Security Headlines

The cyber security headlines of late have been hard to ignore. That’s why CSO of BitGo, Inc. Tom Pageler joined Monday night’s episode of Task Force 7 Radio, diving right into story of the crypto boss… Read More

Software vulnerabilities are becoming more numerous, less understood

Operating a database of software vulnerabilities is a challenging undertaking, according to private vulnerability database operator Risk Based Security. Read More

5 ways to avoid top malware threats

Backdoors, cryptomining, fake apps, and banking Trojans increased substantially in the past year, according to McAfee. Here’s how to protect your business. Read More