-
Lockbit Ramps Up Attacks on Public Sector
PRIVACY PRIVACY Ransomware gang hits Canadian town and Italian government Read More
-
How a sex worker became a defense contractor employee — and an insider threat
PRIVACY PRIVACY The headline read, “How an unqualified sex worker allegedly infiltrated a top Air Force lab” and our eyes immediately rolled as we read the bizarre case of Dr. James Gord. He maneuvered a 32-year-old sex worker into a position of trust within Spectral Energies, a government contractor associated with the U.S. Air Force…
-
What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security
PRIVACY PRIVACY ISAC and ISAO definition [Editor’s note: This article, originally published on July 3, 2019, has been updated with a directory of ISACs and ISAOs.] An Information Sharing and Analysis Center (ISAC) is an industry-specific organization that gathers and shares information on cyber threats to critical infrastructure. ISACs also facilitate the sharing of data…
-
T-Mobile to Pay $350m Settlement in Breach Case
PRIVACY PRIVACY Tens of millions were impacted by 2021 incident Read More
-
Kyndryl launches recovery retainer service for cyberattack response
PRIVACY PRIVACY Kyndryl is now offering a “recovery retainer service,” providing its own expert personnel as on-the-ground help to businesses recovering from ransomware and other types of cyberattacks. The service starts work before attacks happen, however—part of the offering is expert review and remediation of cyberattack preparedness, ensuring that organizations aren’t making easy targets of…
-
NIST Updates Healthcare Security Guidance
PRIVACY PRIVACY The updated document provides more actionable measures for healthcare organizations Read More
-
Indian Insurance Portal Policybazaar Suffers Breach
PRIVACY PRIVACY The company claims that “no significant customer data was exposed” in the incident Read More
-
NCSC Tests Cyber Advisor Program
PRIVACY PRIVACY The Cyber Advisor service will certify individual consultants who can provide practical advice to help secure businesses Read More
-
What Are Ransomware Attacks? An In-Depth Guide
PRIVACY PRIVACY We all love to spend time surfing the web — whether we’re shopping, paying bills, or reacting to funny memes. The internet has also allowed many of us to keep working from home even during the pandemic. The internet is great, but the best way to keep enjoying it is to know where…
-
The future of email threat detection
PRIVACY PRIVACY This blog was written by an independent guest blogger. As businesses continue to adopt cloud integration and remote work increases, security teams are facing more visibility challenges as well as an influx of security event data. There is more need to understand the threats than ever before, as the threat surface area increases,…