The ability to secure corporate and customer data is a conversation that has moved from technologists up to C-level executives and the board. Since the new data security landscape is unknown territory ...
As cyber-threats evolve, so must our mindset. In his recent article at SC Media, Jim Routh (an esteemed Institute for ...
The High Court has begun hearing from people impacted by the major data breach by the Police Service of Northern Ireland ...
The Swedish Authority for Privacy Protection (IMY) is investigating a cyberattack on IT systems supplier Miljödata that ...
Japanese publishing giant Nikkei announced earlier today that its Slack messaging platform had been compromised, exposing the ...
“Currently, only 26 states already have, or are in the process of establishing, a memorandum of agreement for voter verification with SAVE,” USCIS says. “Government officials at all levels in all ...
Cybercriminals have claimed responsibility for the recent cyberattack on the University of Pennsylvania, claiming they stole ...
The most effective security leaders are those who can bridge the gap between technical expertise and business ...
The complaint alleged that as a “result of UPenn’s negligence and insufficient data security, cybercriminals easily ...
President Donald Trump's clampdown on the U.S. Consumer Financial Protection Bureau earlier this year has compounded IT ...
DHS says in the notice that linking to driver’s license data, which it calls the most widely used form of identification, “will allow SAVE to match against other sources to verify immigration status ...
Stealing money without ever swiping a card has become a new reality, driven by a scam known as “ghost tapping” or “ghost ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results