The Cybersecurity Awareness Act would direct the agency to launch a new public-private campaign promoting cyber best practices across small...
RiskRecon, a Mastercard Company, and the Cyentia Institute published “From Uncertainty to Understanding: The Value of Better Data in Third-Party Risk Assessments.” To help organizations choose the best...
Semperis announced the appointment of James (Jim) W. Doggett Jr. as chief information security officer (CISO). A longtime partner at Ernst & Young (EY) LLP and a...
Almost every American adult knows that cyberattacks and breaches are ubiquitous and have primarily targeted companies and government entities. They might even know that the single...
Why aligning IT and Physical Security cybersecurity policies and practices is so important Let’s face it. Cybercriminals are smart. They’re aggressive, persistent, and opportunistic. They can...
Babuk Locker ransomware operators have leaked personal files belonging to police officers from the Metropolitan Police Department (also known as MPD or DC Police) after negotiations went...
The City of Tulsa, Oklahoma, has suffered a ransomware attack that forced the City to shut down its systems to prevent the further spread of the...
GitHub has added support for securing SSH Git operations using FIDO2 security keys for added protection from account takeover attempts. Researchers at North Carolina State University...
The hack highlights jurisdictional issues on pipeline cybersecurity. The White House has formed an interagency task force in response to a cyberattack on Colonial Pipeline Company...
The University of California (UC) has released further details of a data breach affecting staff and students, confirming that sensitive information was taken in the attack. As previously reported by The...
Computer scientists have uncovered a flaw in some DNS resolvers that, left unresolved, might be abused to launch DDoS attacks against authoritative DNS servers. The vulnerability – dubbed TsuNAME –...
Recent Comments