Organizations face many threats to their data systems and information. Knowing all of the fundamental elements to cyber safety is the first step to fulfilling these threats.
The reach of cyber protection is broad. The core regions are explained below, and some other fantastic cyber security plan must take all of them into consideration.
Eliminating old, out-of-date encryption protocols can protect sensitive and valuable data from being accessed by adversaries, the NSA reiterated this week.
The travel company Sabre has agreed to pay $2.4 million and make changes to its cybersecurity policies following a 2017 data breach that exposed 1.3 million consumer credit cards.
NIST's latest guidance is geared towards preventing healthcare organizations that oversee PACS software from exposing patient data.
Threat analysis tools with updated intelligence feeds have become an essential part of defenders' toolkits. In this blog, we look at 50 threat intelligence tools that can help teams better protect their business.
Forrester’s practical and actionable Informational Security Maturity Model - and Digital Guardian - can help organizations gauge their information security program.
The National Institute of Standards and Technology's Cybersecurity Framework is designed to help organizations manage their security risk; in this blog we'll go over its requirements, penalties for failing to comply with it, and best practices.
In our latest group interview, we asked 21 experts and business leaders what they think the most important thing for companies to keep in mind about managed detection and response costs is.
The potential updates to the data privacy law build off of others proposed in October.
A global intrusion campaign involving the company’s IT monitoring and management software could date back to March.
The news, while familiar, is yet another reminder of the importance of securing critical patient data.
Attackers have been actively exploiting a recently uncovered command injection bug in VMware products to access protected data.
The latest attack on COVID-19 vaccine research is aimed squarely at the supply chain of companies and government organizations working to keep the vaccines refrigerated in transit.
Emails from an ongoing campaign are not connected to FINRA and should be deleted, the organization warns.
A new EU Commission paper says there's work to be done when it comes to protecting intellectual property across Member States.
An industry nonprofit suggests that because of the pandemic, the cybersecurity talent gap is shrinking for the first time but that more than half of organizations still are at risk because of cybersecurity staff shortages.
Digital Guardian placed the highest among cybersecurity companies, medium-sized business category, in the Boston Globe's Top Places to Work list.
The bill, which would establish cybersecurity guidelines for IoT devices purchased by the U.S. government, is on track to become law.
Just days after fixing two zero day vulnerabilities, Google has rolled out yet another version of its Chrome browser, resolving a fix for last month's NAT Slipstream attack.
Singapore's recently amended Personal Data Protection Act (PDPA) increases the penalizations imposed on companies for data breaches and recognizes the rights of individuals to protect their personal data.
We’ve released a free policy pack to help customers, especially those in the healthcare and public health sector, protect against the latest Ryuk ransomware campaign.
With news the company will be acquired, Forcepoint DLP customers may be looking for a change.
A new cybersecurity rule will go into effect for DoD contractors at the end of the month to enhance the protection of unclassified information within the supply chain.
Voters in California passed new data privacy legislation, the California Privacy Rights Act - building off the California Consumer Privacy Act - last week.
Not only is the average ransom payment going up, so are cases in which the attackers threaten to release a company's stolen data.
This US logistics company claims a former board member stole company secrets to set up his own competitor.
In hopes that enterprises patch them, the NSA shared a list of 25 vulnerabilities currently being targeted by Chinese hackers.
That Russians were behind the attacks has always been a forgone conclusion to many experts but this is the first time that the U.S. has formally made the accusation.