-
Cybersecurity certifications: Part of your cybersecurity journey
PRIVACY PRIVACY The author is a member of AT&T Cybersecurity’s Consulting Center of Excellence. This is part of a blog series from that elite group. One of the main questions I get asked from people looking to get started in Cybersecurity is, “What certification(s) do I need?”. Who you ask and the number of people…
-
US Firm Pays $16m to Settle Healthcare Fraud Claims
PRIVACY PRIVACY Essilor International resolves False Claims Act allegations Read More
-
Workplace Stress Worse than Cyber-Attack Fears for Security Pros
PRIVACY PRIVACY CIISec study finds few have adopted industry best practices Read More
-
Scammers Create ‘AI Hologram’ of C-Suite Crypto Exec
PRIVACY PRIVACY Online fraudsters appear to be upping their game Read More
-
Why SBOMs alone aren’t enough for software supply chain security
PRIVACY PRIVACY It seems like just yesterday that the mad scramble following the SolarWinds compromise elevated supply chain security to the forefront of every entity, regardless of sector. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), formed the Information and communications technology (ICT) Supply Chain Risk Management task force in an effort to unite public…
-
How to Remove Personal Information From Data Broker Sites
PRIVACY PRIVACY Data brokers are companies that collect your information from a variety of sources to sell or license it out to other businesses. Before they can pass your data along, brokers analyze it to put you into specific consumer profiles. Consumer profiles help businesses suggest products you might like and create targeted marketing campaigns…
-
7 Signs Your Phone Has a Virus and What You Can Do
PRIVACY PRIVACY Our phones store a lot of personal data, including contacts, social media account details, and bank account logins. We use our smartphones for everything under the sun, from work-related communication to online shopping. However, like computer viruses, our phones can be vulnerable to malware. Viruses are a type of malware that replicate themselves…
-
WannaCry explained: A perfect ransomware storm
PRIVACY PRIVACY What is WannaCry? WannaCry is a ransomware worm that spread rapidly through across a number of computer networks in May of 2017. After infecting a Windows computer, it encrypts files on the PC’s hard drive, making them impossible for users to access, then demands a ransom payment in bitcoin in order to decrypt…
-
How 2023 cybersecurity budget allocations are shaping up
PRIVACY PRIVACY Cybersecurity spending in the coming year may not be recession-proof, but it’s likely to be recession-resistant. Still, pressure remains on security leaders to prioritize technologies that generate the most bang for the buck. Forrester released a report Tuesday to help organizations do just that. “It’s hard to assess what 2023 budgets will look…
-
Plex Suffers Data Breach, Warns Users to Reset Passwords
PRIVACY PRIVACY The company said it discovered suspicious activity on one of its databases on Tuesday Read More