Today, technology is evolving at a faster rate than ever before. As a result of the rapid rate of change, we are creating an ever-increasing amount of data.
End-to-end encryption provides a foundational data protection safeguard, allowing secure data transfer between the sender and recipient while blocking it from external compromise. It also means this data can be inaccessible to law enforcement, who then must find alternative means to access that data.
ASIS International announced the recipients of its 2019 Innovative Product Awards (IPA) for Global Security Exchange (GSX) 2019, to be held September 8-12 in Chicago.
The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft.
Seven in 10 senior financial executives at the world’s largest companies believe their insurer would cover most or all of the losses their company would incur in a cyber attack. Many of the losses they foresee, however, are rarely covered by insurance.
In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach could be catastrophic.
The Internet Innovation Alliance (IIA) released a survey showing that Millennial Americans – like older generations – are concerned about the privacy of their online personal information and whether online technology and social media companies are taking the appropriate steps to safeguard the personal information of consumers.
Tangipahoa Parish School System phone lines and email will be offline for the most part on Monday as a precaution after district officials discovered a potential cybersecurity issue on their network Sunday evening.
More than half of organizations (53 percent) rate their Security Operation Center’s (SOC) ability to gather evidence, investigate and find the source of threats as ineffective, according to the Improving the Effectiveness of the Security Operations Center study.