Oiltanking GmbH Group and Mabanaft Group— two companies involved in storing and supplying oil and other materials — have been hit by a cyberattack that has disrupted operations in Germany.
A new collaborative effort will focus on developing high-impact cybersecurity resilience strategies within 100 days to safeguard the water and wastewater sector.
Web 3.0, the anticipated next iteration of the internet, seeks to further decentralize information via artificial intelligence. This presents certain cyber risks for security professionals to watch.
It’s time to re-evaluate the modern data stack to relieve friction points and ensure both accessibility and compliance. By automating security workflows and controls across data stores and integrating into self-service access, productivity and innovation will thrive.
This Data Privacy Day, Security connected with two leaders in the K-12 school cybersecurity field to uncover the challenges of data privacy in the education sector and industry strategies to maintain the security of student and staff information.
One challenge for supply chain security practitioners is choosing which of the multitude of guidance documents and best practice frameworks to use when building a cyber supply chain risk management (C-SCRM) program. Let's explore each framework.
The Department of Homeland Security sent a memo warning of a potential Russian cyberattack on U.S. entities as the situation with Ukraine escalates. Cybersecurity experts weigh in on how enterprise security leaders should prepare.