
Livermore Named Finalist in IDC's Smart Cities North America Award
Livermore's Cyber Safe initiative is dedicated to fostering a secure and inclusive cyber environment within the community. As part of...

Dragos ICS & OT Year in Review for 2022
The Dragos Year in Review for 2022 is a report by Dragos, a cybersecurity firm specializing in industrial control systems (ICS) and...


Webinar: The Board or Council's Role in Cyber Risk Management
The Board or Council's Role in Cyber Risk Management (encore performance, first presented at MISAC Conference October 2022 in Monterey,...


Cracking the Code: Unveiling the Secrets of the Knights Templar's Authentication Methods
Encryption and Codes: A Historical Look at Authentication Methods Do you think the security measures of the past were effective enough to...

The Importance of the CISO
A survey by ThreatTrack demonstrates that the role of CISO is misunderstood and underappreciated by C-Level peers. It seems business...

Prepare for Ransomware
Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack. This guide was a joint effort of...

Nation-State Threat Actors
There has been a rise in the number of cyberattacks attributed to nation-states. Whether this increase is due to a rise in nation-state...


Cybersecurity for Local Governments 2018
2018 update on cybersecurity for local governments. This year marks the rise of the new threat to Local Government from nation states...


Email Flow Rules Help Prevent Scams
A popular attack or threat vector for cybercriminals is to send an email pretending to be from a top-level executive or in the case of...

Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...