Sponsored How NIWC Atlantic is approaching zero trust and user policies Jun 15, 2022 Related Videos See All Videos Derek Manky, Chief Security Strategist and VP Global Threat Intelligence, FortiGuard Labs Building cyber defense strategies to counter increasingly agile attacks FortiGuard Labs’ Derek Manky discusses recent attack methods that show a new level of sophistication and agility to exfiltrate data and evade defensive techniques. Jun 10, 2022 Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022 Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022 Share Facebook LinkedIn Twitter Copy Link More Like This Why blocking cyber threats is no longer enough By Scoop News Group To Catch a Thief: China’s Rise to Cyber Supremacy By Scoop News Group Trellix’s David Graziano talks data loss prevention and AI-driven security By Scoop News Group Top Stories United Natural Foods loses up to $400M in sales after cyberattack By Matt Kapko Senate Democrats seek answers on Trump overhaul of immigrant database to find noncitizen voters By Derek B. Johnson House hearing will use Stuxnet to search for novel ways to confront OT cyberthreats By Derek B. Johnson
Derek Manky, Chief Security Strategist and VP Global Threat Intelligence, FortiGuard Labs Building cyber defense strategies to counter increasingly agile attacks FortiGuard Labs’ Derek Manky discusses recent attack methods that show a new level of sophistication and agility to exfiltrate data and evade defensive techniques. Jun 10, 2022
Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022
Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022
Senate Democrats seek answers on Trump overhaul of immigrant database to find noncitizen voters By Derek B. Johnson
House hearing will use Stuxnet to search for novel ways to confront OT cyberthreats By Derek B. Johnson