Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Seems like the internet follows us wherever we go nowadays, whether it tags along via a smartphone, laptop, tablet, a wearable, or some combination of...
Kremlin and Russia’s TASS news agency websites offline following attacks
As widely anticipated, the conflict between Russia and Ukraine has heated up on cyberspace in the days since Vladimir Putin ordered his troops and tanks...
Play for Ukraine game aims to knock Russian websites offline
A game, developed by the so-called IT Army of Ukraine, makes it easy for anyone around the world to contribute to the overloading of Russian...
Insurance Coverage for NotPetya Losses
Tarah Wheeler and Josephine Wolff analyze a recent court decision that the NotPetya attacks are not considered an act of war under the wording of...
Wiper malware targets Ukraine as military conflict extends into cyberspace
Wiper malware has been detected abusing legitimate drivers and targeting Active Directory servers amid ongoing Russian military conflict in Ukraine. The campaign reflects a growing...
Conti Group Suffers Massive Data Breach
Researchers leak internal messages after geopolitical misstep Read More
DevSecOps code process
Best practices In the first article in this series we covered the basics. In the second article about the planning process, we covered how developers incorporate security...
Nvidia Appears to Brush Off Ransomware Attack
Online chatter suggests chip giant “hacked back” at its attacker Read More
Meta Squeezes Russian State-Controlled Media Platforms
Social media giant restricts access to state media and disrupts disinfo networks Read More
3 biggest cyber risks from the Ukraine-Russia conflict
The invasion of Ukraine by Russia is reason enough for all CISOs to place their teams at a heightened state of alert and readiness in...