Featured Blog
Hackers Are Targeting Your Salesforce: What You Need to Know
This summer, a troubling pattern emerged: hackers are breaking into corporate Salesforce accounts at some of the biggest brands in the world. Google, Louis Vuitton, Dior, Chanel, Allianz Life, Qantas Airlines, and more have all confirmed Salesforce-related breaches. And while you might assume the problem is with Salesforce itself, it’s not. The real issue? Old-fashioned […]
Data encryption, Incident Response
5 Tips for Using Out-of-Band Communication to Bolster Your Incident Response Capabilities
Breaches, Cyberattacks
After the Ransom was Paid: The Groundbreaking Events following the Colonial Pipeline Ransomware Attack
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
Top 3 Reasons Third-Party Vendor Risk Management is Not Easy
Cybersecurity, Cybersecurity Planning
Six Cybersecurity Best Practices That Fit Almost Any Organization’s Budget
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
The Other Side of Supply Chain Security: Tips for Organizations Being Assessed by Enterprise Clients
Cybersecurity Planning, News, Policy Development