As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
Dr. Kelly Fletcher, Performing the Duties of the Department of Defense (DoD) Chief Information Officer, talks about the department's cybersecurity priorities in a rapidly changing technology landscape.
Operation GhostShell, a highly targeted cyber espionage campaign, attacks the aerospace and telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe.
The “Ransom Disclosure Act would require ransomware victims to disclose ransom payments within 48 hours of payment — including the amount of ransom demanded and paid the type of currency used for payment of the ransom, and any known information about the entity demanding the ransom.
Despite the flurry of cyberattacks, an Untangle report finds that SMBs are expanding and embracing new work environments and investing in and investigating new technologies to secure their business.
In his new role as Chief Information Security Officer (CISO) at JLL, Joe Silva will oversee information security policies and threat management, among other responsibilities.
Dark data — masses of unstructured emails, social media posts, documents, photos and more — has bogged down companies for decades, yet it oftentimes remains overlooked. Extracting and eradicating non-value dark data will help make your organization less exposed to risks and liability in the event of a breach.
By understanding each of the bad actors, federal agencies, law enforcement and first responders — often victims of cyberhacktivism —can better prepare for, and prevent, cyberattacks from happening. Here are a few basic steps every public safety agency can take.
The debate around branding two-factor authentication (2FA) messages has heated arguments on both sides. Branding could provide both companies and end users with a more cohesive experience while using 2FA.