News

  • Cybersecurity certifications: Part of your cybersecurity journey

    PRIVACY PRIVACY The author is a member of AT&T Cybersecurity’s Consulting Center of Excellence. This is part of a blog series from that elite group. One of the main questions I get asked from people looking to get started in Cybersecurity is, “What certification(s) do I need?”.  Who you ask and the number of people…

    Read More

  • US Firm Pays $16m to Settle Healthcare Fraud Claims

    PRIVACY PRIVACY Essilor International resolves False Claims Act allegations Read More

    Read More

  • Workplace Stress Worse than Cyber-Attack Fears for Security Pros

    PRIVACY PRIVACY CIISec study finds few have adopted industry best practices Read More

    Read More

  • Scammers Create ‘AI Hologram’ of C-Suite Crypto Exec

    PRIVACY PRIVACY Online fraudsters appear to be upping their game Read More

    Read More

  • Why SBOMs alone aren’t enough for software supply chain security

    PRIVACY PRIVACY It seems like just yesterday that the mad scramble following the SolarWinds compromise elevated supply chain security to the forefront of every entity, regardless of sector. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), formed the Information and communications technology (ICT) Supply Chain Risk Management task force in an effort to unite public…

    Read More

  • How to Remove Personal Information From Data Broker Sites

    PRIVACY PRIVACY Data brokers are companies that collect your information from a variety of sources to sell or license it out to other businesses. Before they can pass your data along, brokers analyze it to put you into specific consumer profiles. Consumer profiles help businesses suggest products you might like and create targeted marketing campaigns…

    Read More

  • 7 Signs Your Phone Has a Virus and What You Can Do

    PRIVACY PRIVACY Our phones store a lot of personal data, including contacts, social media account details, and bank account logins. We use our smartphones for everything under the sun, from work-related communication to online shopping.  However, like computer viruses, our phones can be vulnerable to malware. Viruses are a type of malware that replicate themselves…

    Read More

  • WannaCry explained: A perfect ransomware storm

    PRIVACY PRIVACY What is WannaCry? WannaCry is a ransomware worm that spread rapidly through across a number of computer networks in May of 2017. After infecting a Windows computer, it encrypts files on the PC’s hard drive, making them impossible for users to access, then demands a ransom payment in bitcoin in order to decrypt…

    Read More

  • How 2023 cybersecurity budget allocations are shaping up

    PRIVACY PRIVACY Cybersecurity spending in the coming year may not be recession-proof, but it’s likely to be recession-resistant. Still, pressure remains on security leaders to prioritize technologies that generate the most bang for the buck. Forrester released a report Tuesday to help organizations do just that. “It’s hard to assess what 2023 budgets will look…

    Read More

  • Plex Suffers Data Breach, Warns Users to Reset Passwords

    PRIVACY PRIVACY The company said it discovered suspicious activity on one of its databases on Tuesday Read More

    Read More

News, Advisories and much more

Exit mobile version