Law firms, their clients and all organizations face a volatile insider threat landscape, exacerbated by emerging technologies, interconnected and mobile devices, and new and evolving privacy regulations such as the GDPR and CCPA.
Magecart, an umbrella term composed of dozens of cybercriminal groups that conduct digital credit card-skimming attacks, has reportedly compromised upwards of two million websites and 18,000 hosts.
Threat actors breached the network of cybersecurity company Avast in a sophisticated cyber operation, referred to as “Abiss,” that likely attempted to poison the supply chain and target its anti-virus software, CCleaner.
Donna Roy, Executive Director of the Information Sharing and Services Office at the Department of Homeland Security in the Office of the CIO, will be joining the Consumer Financial Protection Bureau as CIO.
Nearly half (48.5 percent) of C-suite and other executives at organizations that use artificial intelligence (AI) expect to increase AI use for risk management and compliance efforts in the year ahead
The Veterans Affairs (VA) Office of Inspector General (OIG) has found that the VA's Office of Information Technology (OIT) management of mobile devices generally met information security standards.
From ransomware strains and cryptomining campaigns that delivered the most attack payloads to phishing attacks that wreaked the most havoc, what are 2019's nastiest threats, identified by Webroot?
In a recent Security webinar, How You Can Turn Security Training and Awareness into Action, Pieter Danhieux, Co-Founder and CEO of Secure Code Warrior, says there are 111 billion lines of code written by an estimated 22 million developers every year. “Building code is like building a house. If you do everything well, you end up with a beautiful, modern and secure house,” says Danhieux.
October marks Cybersecurity Awareness month, and with seventy percent of financial companies having suffered a cybersecurity incident in the past 12 months, it’s crucial for firms to not only know their biggest cyber risks but how to prevent them.