Industry security measure used to determine how long a threat actor has access in a network until the security vulnerability is removed is called…
Blog
In the Extortion Economy podcast series, Episode Four – The…
In the Extortion Economy podcast series, Episode Four – The Extortion Economy, you learned about ransomware attackers are finding creative ways to launder Bitcoin currency. What is one of the unusual ways Bitcoin currency is cleaned?
In the Extortion Economy podcast series, Episode Five – File…
In the Extortion Economy podcast series, Episode Five – File Not Found, you learned of a state which created legislation to ban public agencies from paying any ransom to their attackers. What state was first to pass legislation banning public agencies from ransomware payments?
Which of the following represents a strategic use of social…
Which of the following represents a strategic use of social network apps by firms and large corporations for enhancing their brand and engaging with their audience effectively?
Which of the following is not an example of larger, conventi…
Which of the following is not an example of larger, conventional firms working with sharing economy startups?
Which of these trends will change how businesses will collab…
Which of these trends will change how businesses will collaborate in the future?
In the Extortion Economy podcast series, Episode Three – All…
In the Extortion Economy podcast series, Episode Three – All Cats and No Mice, what was unique about the FBI’s seizure of the Bitcoin Colonial Pipeline paid to the Darkside ransomware group, according to the FBI agent Elvis Chan?
URL-shortening services such as bit.ly limit the impact of p…
URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.
Some firms are opting for internal social media platforms be…
Some firms are opting for internal social media platforms because…
What is a technology stack?
What is a technology stack?