Considerations for Seamless CCPA Compliance
July 2 2020Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.
Read moreThree steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.
Read moreAn attacker scanned for databases misconfigured to expose information and wiped the data, leaving a ransom note behind.
Read moreStill thinking "the crooks probably won't find me if I make a security blunder"?
Read moreFor decades, we have prized efficiency in our economy. We strive for it. We reward it. In normal times, that's a good thing. Running just at the margins is...
Read moreWe need to learn from the attacks and attempts that have occurred in order to prepare for the future.
Read moreWhether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep every one secure....
Read moreDatabases can be had for as little as $100, on up to $1,100. Most, if not all, are being sold by the hacking group Shiny Hunters.
Read moreWe've seen an ugly trend recently of tech news stories and cybersecurity firms trumpeting claims of ransomware attacks on companies large and small, apparently based on little more than...
Read moreMalware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.
Read moreFollow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.
Read more
Recent Comments