Data Breach at Drug Screening Lab
Data Breach at Drug Screening Lab A configuration error has caused a prolonged data breach at a Florida County’s drug screening laboratory. The security incident...
Hacker Flags Flaw in Swiss Railway System
Hacker Flags Flaw in Swiss Railway System An anonymous hacker has raised the alarm after discovering a vulnerability impacting Switzerland’s national railway system. The flaw...
European nations issue record €1.1 billion in GDPR fines
European data protection authorities have issued fines of €1.1 billion ($1.2 billion) under the General Data Protection Regulation (GDPR) since 28 January 2021, according to...
Protecting Privacy Using the CIS Controls Privacy Guide
The CIS Controls Privacy Guide provides best practices and guidance for implementing the CIS Critical Security Controls (CIS Controls) while considering the privacy impacts on...
Access broker found exploiting Log4j vulnerability in VMware
A gang of cybercriminals known for breaking into computer systems and selling access to them has been discovered exploiting an Apache Log4j vulnerability, Log4Shell, in ...
Mentoring and Role Models Key to Improving Female Representation in Cybersecurity
Mentoring and Role Models Key to Improving Female Representation in Cybersecurity The importance of mentoring and role models in helping women develop careers in cybersecurity...
DevSecOps plan process
In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our security teams overlay onto DevOps for visibility and increased security throughout the...
Nearly $9bn Laundered in Cryptocurrency in 2021
Nearly $9bn Laundered in Cryptocurrency in 2021 Threat actors laundered $8.6bn in cryptocurrency last year, although the real figure could be much higher when “non-crypto”...
QNAP: Act Now to Mitigate DeadBolt Ransomware
QNAP: Act Now to Mitigate DeadBolt Ransomware A leading maker of network-attached storage (NAS) devices is urging customers to upgrade to the latest software version...
12 steps to take when there’s an active adversary on your network
CISOs know they must respond quickly and effectively to an incident, yet surveys point to continuing challenges to deliver on that goal. The State of...