John Shier joins Jim Blasingame to report on how cyber-criminals are exploiting the Zoom platform as more and more people use it during the pandemic social distancing.
John Shier joins Jim Blasingame to report on the increased incidents of cyber-attacks by bad actors taking advantage of the coronavirus pandemic, including scams and malware.
John Shier joins Jim Blasingame to report on how cyber-criminals are exploiting the Zoom platform as more and more people use it during the pandemic social distancing.
John Shier joins Jim Blasingame to report on the increased incidents of cyber-attacks by bad actors taking advantage of the coronavirus pandemic, including scams and malware.
John Shier joins Jim Blasingame to report on how cyber-criminals are exploiting the Zoom platform as more and more people use it during the pandemic social distancing.
John Shier joins Jim Blasingame to discuss examples of how an unlikely vendor became the weak link connection that contributed to a major cyber-breach.
John Shier joins Jim Blasingame to report on a number of examples of where companies and municipalities fell victim to ransomware breaches that resulted in potentially existential chaos and expense.
John Shier joins Jim Blasingame to discuss the increasing expectation by larger customers that smaller vendors bear more cyber-security responsibility as part of the greater supply chain.
John Shier joins Jim Blasingame to discuss examples of how an unlikely vendor became the weak link connection that contributed to a major cyber-breach.
John Shier joins Jim Blasingame to report on a number of examples of where companies and municipalities fell victim to ransomware breaches that resulted in potentially existential chaos and expense.