Help with Search (Search Syntax and Search Operators)
Hiring cyber security professionals to fill current vacancies is one of the toughest and most important challenges we face when trying to build out a successful cybersecurity team. A strong team with a good bond is important and that can be hard to accomplish when supply is low and demand is...
By: Steve Presley, Product Manager, NetDocuments There are many facets to a successful implementation of Zero Trust Security and a living process after it is deployed. In this ILTA roundtable series, our goal is to discuss some of the major topics to consider when starting this important...
1 Comment - no search term matches found in comments.
netDocShare Sync! Bi-Directional Synchronization of NetDocuments with Teams, SharePoint & OneDrive The netDocShare Sync empowers collaboration with the capabilities of syncing business libraries or files such as: Ability to bi-directionally sync files from the Microsoft...
Please enjoy this blog post authored by David Whale, Director Information Security, Fasken Martineau Dumoulin LLP The world of cybersecurity maturity models is on par with going to your favorite buffet (pre-Covid of course) for your birthday dinner. So many options. Government based...
**Please note that this blog is posted on behalf of the author, Fernando Gonçalves, Head of DevSecOps, Congruity360. EVERYTHING-AS-CODE AUTOMATE EVERYTHING TEST EVERYTHING SECURITY BY DEFAULT CHANGING MENTALITIES / YOUR C-LEVEL PARTICIPATION In the last few years,...
Please enjoy this blog post authored by Jarad Schraeder, Cybersecurity Manager, Davis Wright Tremaine LLP. Regardless of the size and scope of your environment, vulnerability management is a daunting task. Depending on the maturity of our vulnerability management program, the vulnerability...
Please enjoy this blog post authored by Ken Fishkin, CISSP, CCSP, CIPT, CIPM, CIPP/US, CISM, CEH, and many others. https://www.linkedin.com/in/kfishkin/ Since 1996, I have been pursuing industry certifications. I have always found them to be an essential part of my career growth,...
Please enjoy this blog post authored by Dr. Georg Thomas, CCISO, CDPSE, CISM, CISSP, GRCP Cyber-attacks are on the rise across the globe with 2021 identified as the highest average cost of data breaches over the past 17 years (IBM, 2021). Law firms are under increased pressure from...
In our 2021 Information Governance blog series regarding Microsoft Teams, we will take a look at the chat features and considerations around the retention and disposition of these messages. The information presented here is not intended to be considered legal advice nor instruction. The blog...
Please enjoy this blog post that was co-authored and posted on behalf of Marc Ohmann - President, CEO - Digital Solutions, Inc and Jamison Masters, Co-Founder, Verus Corporation . A vulnerability is a weakness in a covered device that can be exploited by attackers to gain unauthorized...