More-effective cyber-risk management controls can help bolster a company's policy worthiness. Start with these 10 tips to manage risk as underwriter requirements get more sophisticated.
Read moreI just read an article complaining that NIST is taking too long in finalizing its post-quantum-computing cryptography standards.
This process has been going on since 2016, and since that...
Read more
Threat actors such as the operators of the Cl0p ransomware family increasingly exploit unknown and day-one vulnerabilities in their attacks.
Read moreApple Users See Big Mac Attack, Says Accenture
August 8 2023Accenture's Cyber Threat Intelligence unit has observed a tenfold rise in Dark Web threat actors targeting macOS since 2019, and the trend is poised to continue.
Read moreSANS Teaches Cybersecurity Leadership in Saudi Arabia
August 8 2023Infosecurity learning modules will cover security planning, policy, and leadership.
Read moreThe group continues to target SQL servers, adding the Remcos RAT, BatCloak, and Metasploit in an attack that shows advance obfuscation methods.
Read moreLast week, the department uncovered a data breach that occurred back in June stemming from what it deems to be a cybersecurity ransomware incident.
Read moreChallenging new safety requirements are needed to improve security and work toward a more secure future.
Read more
Recent Comments