Charlie Maclean-Bristol discusses accidental data breaches and gives insights into key takeaways so similar breaches don’t occur in our organizations
Charlie Maclean-Bristol discusses deepfakes and how organizations can be better prepared for them
Charlie Maclean-Bristol looks at the 9 stages of recovery from a cyber incident and highlights the importance of having recovery in our business continuity plans.
by Charlie Maclean-Bristo l
This is the third part of my journey to discover more about backups and the technical aspects of recovery after a cyber incident. I realize…
“Web defacement is an attack in which malicious parties penetrate a website and replace content on the site with their own messages. The messages can convey a political or religious message, profanity, or other inappropriate content that would embarrass website owners, or a notice that the website has been hacked by a specific hacker group.”
Charlie Maclean-Bristol investigates AI-driven scams and examines the advantages and disadvantages of AI in the online world with the help of Google Gemini
Charlie Maclean-Bristol discusses questions organizations should consider when responding to a cyber-attack, including how the attacker got into the system and their potential motives.
How many more times will some struggling organization announce that a cyber-breach or data leak was caused by failure at a 3rd-party contractor?
Start building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability with this free excerpt from the groundbreaking book Building an Effective Cybersecurity Program, by Tari Schreider
Where would all the nation’s critical infrastructure be if we didn’t have a reliable electric grid? How would your business survive?
The world can be a scary place for your business … and cyber threats can be even scarier these days. When hostile state actors and increasingly dangerous corporate espionage are worrying you, you need to focus your energy on cyber threat detection, prevention and response!
This free excerpt from the groundbreaking book Building an Effective Cybersecurity Program…
