-
Privacy in Practice: Securing Your Data in 2022 and Beyond
Every year we can count on new technology to make our lives easier. Right? As beneficial and convenient as tech can be, it can also pose risks to our online safety and privacy—risks that we should be prepared to handle. Increasingly, we’re seeing governments around the world implementing stricter privacy laws. And even major players…
-
Orange County Launches Cybercrime Initiative
Orange County Launches Cybercrime Initiative Authorities in California’s Orange County have launched a new initiative to help the public identify and report cyber-threats. SafeOC is a localized version of the national ‘If You See Something, Say Something’ anti-terrorism public awareness campaign that emphasizes the importance of reporting suspicious items and behaviors to law enforcement. A…
-
Fake Influencer Flags Hacking Tactics
Fake Influencer Flags Hacking Tactics A Swiss secure storage company has launched a creative cybersecurity awareness campaign to show how hackers gather personal data from social media. The campaign by pCloud uses a fake influencer account on Instagram (@thealiceadams) to highlight how users unintentionally give away pieces of sensitive data through their bios and the content they post. “Through…
-
Online Ad Association Fined for Privacy Violation
Online Ad Association Fined for Privacy Violation An association for online advertising companies has been fined hundreds of thousands of dollars for developing an ad-targeting tool that violated European Union data laws. The Belgian Data Protection Authority (BE DPA) said it was necessary to impose “harsh sanctions” on IAB Europe because the association’s Transparency and Consent Framework (TCF) “could,…
-
The Cost of Ignoring the Log4j Vulnerability
Ignorance is not bliss when it comes to the Log4j vulnerability. In the past month, organizations have been scrambling to understand their exposure to the most recent major cyber threat, called “Log4j.” Read More
-
Finding Vulnerabilities in Open Source Projects
The Open Source Security Foundation announced $10 million in funding from a pool of tech and financial companies, including $5 million from Microsoft and Google, to find vulnerabilities in open source projects: The “Alpha” side will emphasize vulnerability testing by hand in the most popular open-source projects, developing close working relationships with a handful of…
-
Tenable Launches Suite of New Product Features to Deliver Full Lifecycle Cloud-Native Security
Our newest Tenable.cs product features are designed to enable organizations to stay agile while reducing risk. A suite of upgrades to Tenable.cs, our cloud-native application protection platform, are designed to enable organizations to secure cloud resources, container images and cloud assets to provide end-to-end security from code to cloud to workload. Even as organizations are…
-
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information The fact that misinformation is rampant online is not a new phenomenon. Perhaps less understood is the intersection between how often an individual sees a piece of misinformation and how likely they are to believe it. In a session at the Enigma 2022 conference on February…
-
Third of Employees Admit to Exfiltrating Data When Leaving Their Job
Third of Employees Admit to Exfiltrating Data When Leaving Their Job Nearly one-third (29%) of employees admitted taking data with them when they leave their job, according to new research from Tessian. The findings follow the ‘great resignation’ of 2021, when workers quit their jobs in huge waves following the COVID-19 pandemic. Unsurprisingly, close to three-quarters…
-
The ultimate guide to Cyber risk management
This blog was written by an independent guest blogger. Ambitious information security experts serve as a critical part of cyber risk management. The corporation is responsible for structuring IT and information security activities to protect its data resources, such as hardware, software, and procedures. To stay competitive, enterprises must design and establish secure environments that…