Organizations face many threats to their data systems and information. Knowing all of the fundamental elements to cyber safety is the first step to fulfilling these threats.
The reach of cyber protection is broad. The core regions are explained below, and some other fantastic cyber security plan must take all of them into consideration.
In an abrupt reverse course, Brazil's data protection law won't be bumped to 2021 by COVID-19; instead it will go into effect over the next few days.
With industrial espionage on the rise, we asked 24 manufacturing experts the best ways to protect intellectual property at manufacturing firms.
Bills that would regulate the sharing of genetic data and carve out coverage in the CCPA of some HIPAA data are close to being laws in California.
A recap of recent phishing activity trends found a decrease in detected phishing sites but a big increase in Business Email Compromise attack losses, around $80 million per attack.
Saudi Arabia using stolen twitter data to target critics, a significant increase in vishing, and the Secret Service buying location data to bypass warrants- catch up on this week’s news with the Friday Five. - catch up on all the week's news with the Friday Five.
Two of the country’s biggest electric vehicle manufacturers continue to dispute the particulars of a lawsuit involving poaching talent and stealing trade secrets.
CISM (Certified Information Security Manager) is an advanced certification designed for IT professionals who focus on information security management. In this post, we’ll discuss what CISM is, the CISM certification process, and the benefits of being CISM-certified.
Scams targeting small businesses are unfortunately commonplace these days. The latest attempts to phish business owners' SBA loan relief logins.
In the wake of news that attackers have been carrying out a successful voice phishing campaign against companies for a month, government orgs offered tips on how employees working from home can mitigate future attacks.
NYDFS made its first enforcement action around its Cybersecurity Regulation, 23 NYCRR 500, alleging errors and deficient controls led to a breach at an insurance company.
The two hackers were also linked to attempts to hack American biotech firms working on a coronavirus (COVID-19) vaccine.
The researcher worked for the hospital for 10 years but acknowledged last month that and her husband stole its data and used it to launch two companies, one in China, one in the US.
Anthony Levandowski, the former Google engineer, was sentenced this week, four months after he plead guilty to stealing Google's trade secrets.
An ex-worker who allegedly stole hundreds of company files had previously attempted to dismiss the lawsuit.
The FBI warns of new DDoS attack vectors, iOS14 allows unexpected prying behavior on Instagram, and NCSC research reveals the cybersecurity sector needs improvement in inclusion - catch up on all the week's news with the Friday Five.
The FBI warned organizations last week that attackers are increasingly using built-in network protocols to launch destructive distributed denial of service attacks.
With more businesses running vital business computing functions in the cloud today, cloud security is a must as attackers seek to exploit vulnerabilities and gain unauthorized access to sensitive data. In this post, we’ll talk about the benefits of cloud security as well as some best practices to follow.
We created an infographic based on The DG Data Trends Report, which assesses the risk of data loss during the COVID-19 pandemic.
Modern businesses are moving their data to the cloud, and for good reason. But as cloud platform services see an increase in use, there has been an explosion in the number of unmanaged risks in the mission-critical digital industry. This is where Cloud Security Posture Management (CSPM) comes into play.
Bring Your Own Device (BYOD) remains both a major opportunity and challenge for enterprises. By following the right approach to identifying BYOD risk and developing effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.
20 Data Security Experts Share Best Practices for Data Security in Hybrid Environments.
When Broadcom acquired Symantec in the fall of 2019, there were many questions in the market from their customer base. Many of them came to us asking for assistance in protecting their most critical data and reducing their vendor uncertainty.
Threat intelligence is what becomes of data after it has been gathered, processed, and analyzed. Organizations can use threat intelligence against cyber threats. In this article, we’ll discuss what threat intelligence is, its types, how it works, and why it’s important.
The hacker, based in Kazakhstan, sold backdoor access to over 300 victim networks, some for up to $100,000.
The Federal Bureau of Investigation said this week that its seen a spike in fraudulent unemployment insurance claims related to the pandemic.
The FBI recently reflected on the the arrest of a hacker who stole intellectual property from a tech company, including how collaboration and activity monitoring played a role in tracking him down.
The Federal Reserve shared insights around mitigating synthetic identity fraud, one of the quickest growing financial threats, this week.
The European Data Protection Supervisor (EDPS) announced its plans for 2020-2024 this week and stressed that the EU needs digital solidarity and to make data work for all people across Europe’s borders.
A new lawsuit alleges the chief developer of the company's IP left the company and took some of its confidential information with him to start a new competing company.
A health plan recently disclosed a data breach of 11,500 patients that was triggered by an email mistake.
The Federal Bureau of Investigation’s Director Christopher Wray discussed the Chinese Communist Party's vast influence on U.S. intellectual property, the financial sector, and democracy in a talk this week.
The CIA failed to install safeguards to prevent the theft of its most valuable cyber weapons in 2016.