Overlooked Security Risks of the M&A Rebound
November 10 2020Successful technology integration, post-merger, is tricky in any market, and never more so than with today's remote work environments and distributed IT infrastructure.
Read moreSuccessful technology integration, post-merger, is tricky in any market, and never more so than with today's remote work environments and distributed IT infrastructure.
Read moreDon't be fooled by a website that looks OK - it's easy for crooks to make an exact copy. (This time, they got just one letter wrong.)
Read moreIt's bad enough that many ransomware gangs now have blogs where they publish data stolen from companies that refuse to make an extortion payment. Now, one crime group has...
Read moreWith ransomware on the rise, more organizations are opting to purchase cyber insurance -- tipping off criminals about how much to demand for access back to pilfered systems and...
Read moreProtecting mobile apps requires a multilayered approach with a mix of cybersecurity measures to counter various attacks at different layers.
Read more
Over at Lawfare: “2020 Is An Election Security Success Story (So Far).”
What’s more, the voting itself was remarkably smooth. It was only a few months ago that professionals...
Read more
Ghimob is a full-fledged spy in your pocket, Kaspersky says.
Read moreThe agreement covers Zoom's misleading statements on security for its audio and video calling.
Read moreHotel reservation platform Prestige Software compromised personal data belonging to millions of travelers through a misconfigured AWS S3 bucket.
Read moreThe United Kingdom and the regional government of Flanders kick off four pilots of the Solid data-privacy technology from World Wide Web inventor Tim Berners-Lee, which gives users more...
Read more
Recent Comments