In this month’s briefing we explore:
Cybersecurity
- IBM’s mobile security awareness and training (1:43)
Threat Actor Campaigns
- Make defending against Trojan horses a priority (4:33)
Regulatory, Legal, and Compliance
- China’s unfettered access to internet service providers (7:09)
Exploitation and Tactics
- Quantum computing and cyber security: bad, good, or both? (9:09)
If you have a question or would like to receive these monthly briefings via email, submit a request here.