Maersk Cybersecurity Breach History

Maersk Cybersecurity Breach History includes the specific details about the event, scope, impact and lessons learned. #sms2813985804whiteboardsession   The Maersk cybersecurity breach occurred in June 2017 and was a result of the NotPetya ransomware attack....

EscalationVsIncidentResponse

EscalationVsIncidentResponse Here are the top 5 differences between an escalation list and an incident response list? An escalation list and an incident response list are both important tools used in different aspects of managing issues within an organization. Here...

#uemvsgateway

#uemvsgateway Unified Endpoint Management (UEM) like VMWare’s WorkspaceONE and Gateway-based email filters (like Mimecast) are two distinct cybersecurity solutions that address different aspects of an organization’s security posture. Here are the top five...

#24×7

#24×7 A Central Station is a specialized facility that provides 24/7 commercial and residential property monitoring and response services for various security systems. Its primary purpose is to ensure the safety and security of its customers by monitoring...

#CEODriversForAvCISO

#CEODriversForAvCISO So what drives a CEO to seek out a CISO? or even consider our CISO as a Service? When CEOs hire a fractional Chief Information Security Officer (CISO), they typically aim to achieve specific business outcomes and improvements in their...

#wherethepacketsfly

Direction of Traffic Flow: North-South traffic refers to data that flows ‘externally’, from an organizations private network through an Internet gateway. East-West traffic refers to data that flows ‘internally’, within and inside an...