News

  • Privacy in Practice: Securing Your Data in 2022 and Beyond

    Every year we can count on new technology to make our lives easier. Right? As beneficial and convenient as tech can be, it can also pose risks to our online safety and privacy—risks that we should be prepared to handle. Increasingly, we’re seeing governments around the world implementing stricter privacy laws. And even major players…

    Read More

  • Orange County Launches Cybercrime Initiative

    Orange County Launches Cybercrime Initiative Authorities in California’s Orange County have launched a new initiative to help the public identify and report cyber-threats. SafeOC is a localized version of the national ‘If You See Something, Say Something’ anti-terrorism public awareness campaign that emphasizes the importance of reporting suspicious items and behaviors to law enforcement. A…

    Read More

  • Fake Influencer Flags Hacking Tactics

    Fake Influencer Flags Hacking Tactics A Swiss secure storage company has launched a creative cybersecurity awareness campaign to show how hackers gather personal data from social media. The campaign by pCloud uses a fake influencer account on Instagram (@thealiceadams) to highlight how users unintentionally give away pieces of sensitive data through their bios and the content they post.  “Through…

    Read More

  • Online Ad Association Fined for Privacy Violation

    Online Ad Association Fined for Privacy Violation An association for online advertising companies has been fined hundreds of thousands of dollars for developing an ad-targeting tool that violated European Union data laws.  The Belgian Data Protection Authority (BE DPA) said it was necessary to impose “harsh sanctions” on IAB Europe because the association’s Transparency and Consent Framework (TCF) “could,…

    Read More

  • The Cost of Ignoring the Log4j Vulnerability

     Ignorance is not bliss when it comes to the Log4j vulnerability. In the past month, organizations have been scrambling to understand their exposure to the most recent major cyber threat, called “Log4j.” Read More

    Read More

  • Finding Vulnerabilities in Open Source Projects

    The Open Source Security Foundation announced $10 million in funding from a pool of tech and financial companies, including $5 million from Microsoft and Google, to find vulnerabilities in open source projects: The “Alpha” side will emphasize vulnerability testing by hand in the most popular open-source projects, developing close working relationships with a handful of…

    Read More

  • Tenable Launches Suite of New Product Features to Deliver Full Lifecycle Cloud-Native Security

    Our newest Tenable.cs product features are designed to enable organizations to stay agile while reducing risk. A suite of upgrades to Tenable.cs, our cloud-native application protection platform, are designed to enable organizations to secure cloud resources, container images and cloud assets to provide end-to-end security from code to cloud to workload. Even as organizations are…

    Read More

  • #Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information

    #Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information The fact that misinformation is rampant online is not a new phenomenon. Perhaps less understood is the intersection between how often an individual sees a piece of misinformation and how likely they are to believe it. In a session at the Enigma 2022 conference on February…

    Read More

  • Third of Employees Admit to Exfiltrating Data When Leaving Their Job

    Third of Employees Admit to Exfiltrating Data When Leaving Their Job Nearly one-third (29%) of employees admitted taking data with them when they leave their job, according to new research from Tessian. The findings follow the ‘great resignation’ of 2021, when workers quit their jobs in huge waves following the COVID-19 pandemic. Unsurprisingly, close to three-quarters…

    Read More

  • The ultimate guide to Cyber risk management

    This blog was written by an independent guest blogger. Ambitious information security experts serve as a critical part of cyber risk management. The corporation is responsible for structuring IT and information security activities to protect its data resources, such as hardware, software, and procedures. To stay competitive, enterprises must design and establish secure environments that…

    Read More

News, Advisories and much more

Exit mobile version