Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
When lawmakers and higher education take steps to prevent official users from accessing the popular video-sharing app on their devices, corporations should sit up and take notice. → Read More
Several key US departments are falling woefully short on cybersecurity measures for infrastructure connected to the internet of things and operational technologies, the GAO said in a scathing report. → Read More
The CyberSheath report found that US defense contractors are “woefully unprepared” and often don’t meet even the most basic security requirements that would keep military secrets safe. → Read More
A US Government Accountability Office report is calling for a host of changes to improve privacy within various federal agencies and departments. How those changes get implemented will depend largely on the establishment of new privacy leaders. → Read More
The conviction of Uber's former CSO could change the roles of top security leaders and raises the level of personal risk in the wake of a breach. → Read More
The Department of Justice and FBI claim three Iranian citizens conducted a global cybercrime operation while separately the US Treasury sanctions Iran. → Read More
Image geotags, metadata, and location information can allow competitors, cybercriminals, and even nation-state threat actors to gain knowledge they can use against organizations. → Read More
The lawsuit claims the data broker is putting people at risk of "stigma, stalking, discrimination, job loss, and even physical violence” through the sale of geolocation data. → Read More
Zero trust is not a product, but a security methodology based on defense-in-depth and least-privileged access concepts. → Read More
Organizations must be willing to ask software vendors hard risk-based questions and be prepared for that to lengthen the purchase process. → Read More
In the world of intelligence, “capability present” changes the conversation from if to when. Huawei is an espionage threat not because of what it has done but because of what it can do. → Read More
Data over-collection is a security and compliance risk, and that's why CISOs need a say in decisions about what data to collect. → Read More
Outside experts can be willing or accidental security threats. Reduce that risk by changing how you onboard, train and offboard them. → Read More
The June 2022 report offers recommendations to the private sector, U.S. Congress, and the federal government to build up the nation's cybersecurity talent pool. → Read More
The nature and scope of the data stolen in the U.S. Office of Personnel Management presents a life-long risk to victims, who might get as little as $700 if the court accepts the settlement. → Read More
Genentech employees stole the company's data on behalf of JHL Biotech for years. What could they have done to spot the theft sooner? → Read More
MITRE Engenuity and major business partners have developed an knowledge base of malicious insiders' tactics, techniques and procedures. → Read More
Facial recognition as a service has caught the attention of regulators and litigators. CISOs at companies considering the technology need strong privacy protections in place. → Read More
The threat of cyberattacks crossing Ukrainian and Russian borders is real, and these are the most likely risks that businesses need to consider. → Read More
Two recent court cases expose the capabilities of publicly available spyware and how businesses and governments use them for malicious purposes. → Read More