Gigabyte Technology, a Taiwanese manufacturer and distributor of computer hardware, has allegedly suffered a massive data breach as a result of a ransomware attack.
U.S. senators urged the Federal Communications Commission (FCC) to address surveillance threats posed by foreign corporations managing U.S. telecommunications providers.
A new survey from Nexor shows the knowledge gap when it comes to cybersecurity, with 23% of employers not knowing where to begin protecting their businesses from cyber threats or being able to afford adequate protection.
Employees and non-employee contractors continue representing the most critical weak link in the IT chain. Too many employees, and vendors using corporate networks, are still falling for phishing attacks. Enhanced worker training on cyber risks helps, but training coupled with stronger systems offers the best protection against cyber threats.
Ed Skoudis, a cybersecurity leader and educator, has been named the new President of the SANS Technology Institute, according to a statement. Ed will lead the institute's degree programs and Internet Storm Center.
When it comes to cyber incident management of third-party risks, enterprise security professionals can follow a simplified task list to cover their bases by answering the questions "who, what, where, when, why and how."
The new bill, the DHS Software Supply Chain Risk Management Act of 2021 (H.R. 4611), will secure the supply chains involved in Department of Homeland Security software contracts by requiring a new certification.
Shirin Hamid, an experienced cybersecurity and IT professional, is expected to begin as the CIO and Director of the IT Department at the International Monetary Fund (IMF) in January 2022.
Malware authors often take advantage of vulnerabilities in popular software. But, malware is also prone to bugs and coding errors, causing it to crash and serve as backdoors — any method by which authorized and unauthorized users can get around normal security measures and gain high-level user access — for white hat hackers.