Biometrics in the Great Beyond A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death? The Entertainment Biz Is Changing, But the Cybersecurity Script Is One We've Read Before Several A-list celebrities have found themselves at the center of a ransomware attack -- and it's certainly not the first time hackers have gone after them or the entertainment industry. What are security pros doing wrong? 8 Supply Chain Security Requirements Complex supply chains have complex security requirements, but secure them you must. Here's where to start.
April showers bring – a May cartoon caption contest! Submit your caption for John Klossner's latest cartoon, and our editors will reward the winner with a $25 Amazon gift card.
In this webinar, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today's most current threats and online exploits.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.