Lock sitting on a keyboard with dramatic lighting
How to decrypt data from ransomware

What is a decryption key? How is it used? And most importantly, what’s involved when it comes time to decrypt data from ransomware?  For the savvy CISO, understanding how decryption keys are used is vital. But it’s even more important…

Keep Reading
arrows
Most cybersecurity insurance policies are worthless in 2023.

Cybersecurity insurance policies have been seen by CISOs as a last-resort safety net, but by 2023 that safety will almost entirely be gone. Historically, losses incurred from downtime are reimbursed if tech executives agree to a set of compliance standards…

Keep Reading
Someone holding phone running Microsoft Teams
Why Are Teams Invites Added To Zoom Meetings?

Why are Teams invites added to Zoom meetings? What, you thought it was just you? It’s actually common. This irritating phenomenon is confusing for colleagues, vendors, and clients, and after reaching out to Microsoft even their solution was a bit…

Keep Reading