Cybersecurity metrics corporate boards want to see
Cybersecurity pros interested in metrics and measures frequently ponder and pontificate on what measures would be best to show the board of directors. That can...
Stay on top of your online security with our Protection Score
How protected am I online? Customers often ask us some version of this question. It’s a good question and in the past, there was no direct answer – only recommendations. For instance,...
Friday Squid Blogging: Ten-Foot Long Squid Washed onto Japanese Shore — ALIVE
This is rare: An about 3-meter-long giant squid was found stranded on a beach here on April 20, in what local authorities said was a...
You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results
Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information...
Finnish Hotels’ Data Compromised
Cyber-attack on booking system exposes personal data of thousands of high-end hotel guests Read More
BIO-ISAC Partners with NY Metro InfraGard
Bioeconomy ISAC and New York Metro InfraGard Members Alliance announce partnership Read More
Secret School District Crypto Miner Resigns
Texas school district employee caught mining cryptocurrency at school quits job Read More
Ransomware costs show prevention is better than the cure
If you are worried about the financial hit of paying a ransom to cybercriminals, wait until you find out the true cost of a ransomware...
Video Conferencing Apps Sometimes Ignore the Mute Button
New research: “Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps“: Abstract: In the post-pandemic era, video conferencing apps (VCAs)...
Elon Musk says Twitter DMs should be end-to-end encrypted
Elon Musk's takeover of the company might bring a swathe of changes to Twitter, including the introduction of end-to-end encryption for direct messages (DMs). Read...