Author: Karl Nelson

1. Top-Down: Mitigating Cybersecurity Risks Starts With The Board 2. Twitter’s  Cybersecurity  Flaws Pose National...

1. The Top 3 AI Myths in Cybersecurity  2. Why Employees Violate Cybersecurity Policies 3.Why the Financial Services Industry...

1. Ignoring Cybersecurity Can Sour M&A Deals  2. These Are The Cybersecurity Threats of Tomorrow That You Should Be...

1. Gartner: 8 Ways Cybersecurity Will Change Companies  2. Cybersecurity And The Metaverse: Identifying The Weak Spots...

1. Summertime, The Season For Heightened Cybersecurity 2. Whaling Attack: What It Is and How You Can Prevent One ...

1. Apple Demos Safari’s ‘Passkeys’ Support in MacOS Ventura That Will Help Bring an End to Passwords  2. Humans Still Weakest Link in...

1. The Future of Zero Trust In a Hybrid World  2. Prepare for Deepfake Phishing Attacks in the Enterprise ...

1.Top 10 Cybersecurity Journalists and Reporters to Follow on Twitter  2. Personal Liability for Directors Who Disregard Cybersecurity...

1. How Apple, Google, and Microsoft Will Kill Passwords and Phishing in One Stroke  2. Training to Beat a Bad Cybersecurity Culture...