Privacy in Practice: Securing Your Data in 2022 and Beyond
Every year we can count on new technology to make our lives easier. Right? As beneficial and convenient as tech can be, it can also...
Orange County Launches Cybercrime Initiative
Orange County Launches Cybercrime Initiative Authorities in California’s Orange County have launched a new initiative to help the public identify and report cyber-threats. SafeOC is...
Fake Influencer Flags Hacking Tactics
Fake Influencer Flags Hacking Tactics A Swiss secure storage company has launched a creative cybersecurity awareness campaign to show how hackers gather personal data from...
Online Ad Association Fined for Privacy Violation
Online Ad Association Fined for Privacy Violation An association for online advertising companies has been fined hundreds of thousands of dollars for developing an ad-targeting tool that...
The Cost of Ignoring the Log4j Vulnerability
Ignorance is not bliss when it comes to the Log4j vulnerability. In the past month, organizations have been scrambling to understand their exposure to the...
Finding Vulnerabilities in Open Source Projects
The Open Source Security Foundation announced $10 million in funding from a pool of tech and financial companies, including $5 million from Microsoft and Google,...
Tenable Launches Suite of New Product Features to Deliver Full Lifecycle Cloud-Native Security
Our newest Tenable.cs product features are designed to enable organizations to stay agile while reducing risk. A suite of upgrades to Tenable.cs, our cloud-native application...
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information The fact that misinformation is rampant online is not a new phenomenon. Perhaps less understood is...
Third of Employees Admit to Exfiltrating Data When Leaving Their Job
Third of Employees Admit to Exfiltrating Data When Leaving Their Job Nearly one-third (29%) of employees admitted taking data with them when they leave their...
The ultimate guide to Cyber risk management
This blog was written by an independent guest blogger. Ambitious information security experts serve as a critical part of cyber risk management. The corporation is...