The Time We Hacked a Private Equity Firm…from Their Lobby
This test was part of the client’s Cybersecurity Risk Assessment within Agio’s larger SEC Cybersecurity Readiness Program.
This test was part of the client’s Cybersecurity Risk Assessment within Agio’s larger SEC Cybersecurity Readiness Program.
A strong cybersecurity program depends on governance to ensure broad participation, establish clear authority, and enable fully informed decision-making.
Just as weather anomalies have been dominating conversation at the dinner table, another type of cloud has emerged in the mainstream news at a record-setting pace: cloud computing.
Do private equity firms pose a bigger cybersecurity challenge than hedge funds?
Hackers target organizations that have access to personal health information (PHI), meaning educational and health care institutions have a bullseye on their backs.
The third part of the CIA triad — availability — often surprises people. Contrary to popular belief, being “secure” does not mean locking down your information.
As the “I” in the CIA triad, integrity is essential to a strong information security program.
The CIA triad is a base standard that every organization needs. In this first blog in a series of three, we examine the nuances of confidentiality.
News outlets clamored this week to report a severe design flaw in all modern processors, including Intel, AMD, and ARM processors.
Every organization should mitigate tangible threats in their area.
If you’re like most, it probably took you 61 days to discover you even had a breach in the first place (we can help with that).
It’s ironic to note the ones setting the rules and providing guidance on cybersecurity — the U.S. government — aren’t eating their own dog food.
This is the text content