How to Write a Cybersecurity Playbook During a Pandemic
IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on.
Mobile Security – Threatpost
IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on.
Mobile Security – Threatpost
The hospital data breach playbook — What to do before, during and after Becker’s Hospital Review
“data breach” – read more
Inside F5’s cyber security playbook ComputerWeekly.com
F5 Networks’ CISO talks up measures that the application delivery and security specialist is employing to fend off cyber attackers that come knocking on its …
Computerworld |
Google's HTC move borrows from Apple's playbook
Computerworld With that in mind, Google's buyout of HTC's engineering IP will enable it to create a pure Android play by marrying hardware and software in a move that could eventually reduce fragmentation in the Android ecosystem. HTC has … "Now, the Samsung … |