Two third-party services left Facebook user data exposed online — in one case, 540 million records of user comments — highlighting the ease with which third-party developers can access...
Read moreTrue Cybersecurity Means a Proactive Response
April 5 2019Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security. Cybercriminals are always works in progress. Their knowledge and ability to bypass security systems...
Read moreTrue Cybersecurity Means a Proactive Response
April 5 2019Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security. Cybercriminals are always works in progress. Their knowledge and ability to bypass security systems...
Read moreChinese National Carries Malware Into Mar-a-Lago
April 4 2019A Chinese woman arrested for entering the grounds of Mar-a-Lago under false pretenses was carrying electronic equipment holding malware. Chinese national Yujing Zhang was arrested for breaching the perimeter...
Read moreChinese National Carries Malware Into Mar-a-Lago
April 4 2019A Chinese woman arrested for entering the grounds of Mar-a-Lago under false pretenses was carrying electronic equipment holding malware. Chinese national Yujing Zhang was arrested for breaching the perimeter...
Read morePeople who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success. Blockchain, or distributed ledger technology (DLT), is...
Read morePeople who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success. Blockchain, or distributed ledger technology (DLT), is...
Read moreDespite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security. A high percentage of organizations are exposed to...
Read moreDespite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security. A high percentage of organizations are exposed to...
Read moreNames, addresses, Social Security numbers, and birth dates may have been pilfered in the attack. Georgia Tech this week revealed that an attacker infiltrated a central database and stole...
Read more
Recent Comments