Sponsored How NIWC Atlantic is approaching zero trust and user policies Jun 15, 2022 Related Videos See All Videos Derek Manky, Chief Security Strategist and VP Global Threat Intelligence, FortiGuard Labs Building cyber defense strategies to counter increasingly agile attacks FortiGuard Labs’ Derek Manky discusses recent attack methods that show a new level of sophistication and agility to exfiltrate data and evade defensive techniques. Jun 10, 2022 Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022 Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022 Share Facebook LinkedIn Twitter Copy Link More Like This CMMC compliance made practical: A data-first path forward By Scoop News Group Why blocking cyber threats is no longer enough By Scoop News Group To Catch a Thief: China’s Rise to Cyber Supremacy By Scoop News Group Top Stories Fortinet’s latest zero-day vulnerability carries frustrating familiarities for customers By Matt Kapko Undressed victims file class action lawsuit against xAI for Grok deepfakes By Derek B. Johnson Lawmakers wonder when Trump administration will weigh on soon-expired surveillance powers By Tim Starks
Derek Manky, Chief Security Strategist and VP Global Threat Intelligence, FortiGuard Labs Building cyber defense strategies to counter increasingly agile attacks FortiGuard Labs’ Derek Manky discusses recent attack methods that show a new level of sophistication and agility to exfiltrate data and evade defensive techniques. Jun 10, 2022
Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022
Brian Gardner, CISO, City of Dallas, Texas Developing zero trust strategies that don’t limit access to FOIA data Jun 8, 2022
Fortinet’s latest zero-day vulnerability carries frustrating familiarities for customers By Matt Kapko
Lawmakers wonder when Trump administration will weigh on soon-expired surveillance powers By Tim Starks