Mobile telecommunication company T-Mobile US, Inc. has revealed that a data breach on its systems that compromised some of its customers’ personal information.
New research from The Australian National University (ANU) discusses seven scenarios in how the coronavirus could affect the global economy, including the number of people who could die from the virus.
Most people do not know that ethical hackers are people who are hired to think like a hacker or bad actor. They meticulously probe a company's systems to find any weaknesses and bring them to the attention of the business before the bad actors exploit them. Ethical hacking is an investment that companies in the modern world can't afford to do without.
Why is Kilos - a new cybercriminal engine - quickly becoming popular, and what are the threats that security researchers and operations team face with Kilos?
2020 is here and companies that fall under the California Consumer Privacy Act (CCPA) requirements need to take immediate actionable steps now. Non-compliant businesses will not only face hefty fees but potentially adverse impacts to their brand, a loss of customers and negative PR. What are three tips to ensure your enterprise complies with the CCPA?
The use of IP-based access control solutions to manage employee comings and goings has dramatically increased in recent years. The Internet of Things (IoT) has added connectivity to an abundance of devices that better facilitate access which has users – and potential users – rightfully concerned about the security of these newer technologies.
Steve Pugh joined has joined Twilio as its chief security officer to lead the company’s global trust and security team responsible for corporate, physical and cybersecurity.
Jeff Franklin, who served as the State of Iowa’s Chief Information Security Officer for the past 10 years, has been named Iowa's Chief Cybersecurity Officer.