More recently, on May 21, the SEC staff issued further guidance to clarify the distinction between two types of Form 8-K disclosures: Item 1.05, which should be used to disclose material cybersecurity ...
Popular file transfer tool MOVEit's recent data security vulnerability prompted many businesses to communicate, internally and externally, about the impact of the incident on its business. Businesses ...
Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack. In a startling discovery, a recent report found ...
Don’t wait until it’s too late to discover your IR plan has holes. Download our resource to secure your strategy and your schools. Rebecca Torchia is a web editor for EdTech: Focus on K–12. Previously ...
Members pictured from left to right. [Image credit: Photos courtesy of the individual members] The Fast Company Executive Board is a private, fee-based network of influential leaders, experts, ...
In today’s digital landscape, the importance of an effective security plan cannot be overstated. Such a plan is vital for safeguarding sensitive information and critical assets. Within this ...
Expertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. It’s time to update your incident response policies. Typically, an incident response plan ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results