Deprecated: version_compare(): Passing null to parameter #2 ($version2) of type string is deprecated in /var/www/wp-content/plugins/astra-portfolio/class-brainstorm-updater-astra-portfolio.php on line 115

Deprecated: Creation of dynamic property ElfsightYoutubeGalleryPluginUpdate::$optionSlug is deprecated in /var/www/wp-content/plugins/elfsight-youtube-gallery-cc/core/includes/update.php on line 23

Deprecated: Creation of dynamic property ElfsightYoutubeGalleryPluginAdmin::$customScriptUrl is deprecated in /var/www/wp-content/plugins/elfsight-youtube-gallery-cc/core/includes/admin.php on line 62

Deprecated: Creation of dynamic property ElfsightYoutubeGalleryPluginAdmin::$customStyleUrl is deprecated in /var/www/wp-content/plugins/elfsight-youtube-gallery-cc/core/includes/admin.php on line 63

Deprecated: Creation of dynamic property ElfsightYoutubeGalleryPluginAdmin::$helpscoutSubmitUrl is deprecated in /var/www/wp-content/plugins/elfsight-youtube-gallery-cc/core/includes/admin.php on line 69

Deprecated: Creation of dynamic property ElfsightYoutubeGalleryPluginAdmin::$helpscoutPluginId is deprecated in /var/www/wp-content/plugins/elfsight-youtube-gallery-cc/core/includes/admin.php on line 70

Deprecated: Creation of dynamic property ElfsightYoutubeGalleryPluginAdmin::$checkSupportExpiredUrl is deprecated in /var/www/wp-content/plugins/elfsight-youtube-gallery-cc/core/includes/admin.php on line 71
Admin – MIKE ECHOLS CYBERSECURITY

Author name: Admin

When the Wrong Person Leads Cybersecurity

By Matthew Rosenquist Succeeding at managing cybersecurity risks is tremendously difficult even for seasoned professionals. To make situations worse, poorly suited people are often chosen to lead security organizations, bringing about disastrous results. This has contributed to weaker risk postures for organizations and the rapid turnover in cybersecurity leadership. I am unhappy to report that

When the Wrong Person Leads Cybersecurity Read More »

Artifical Expectations for Cyber Intelligence

1. Cybersecurity’s changing landscape Attacks on computing systems and infrastructure continue to grow in complexity, speed, frequency, and scale. We have seen new attack techniques and the exploitation of new attack surfaces aimed at disrupting critical infrastructure and accessing confidential data.[1] In 2021 alone, the Microsoft 365 Defender suite, supported by AI techniques, blocked more than

Artifical Expectations for Cyber Intelligence Read More »

Scroll to Top