A new self-assessment tool is available to 911 authorities and emergency communication centers (ECC) and public safety answering points (PSAP) administrators and oversight personnel.
The International Society of Automation (ISA), a globally recognized authority for industrial automation training since 1945, and the University of Akron, an influential public research university in the region, have entered into a workforce training agreement to offer the ISA IEC62443 Cybersecurity Training and Certificate program in Akron.
Our baseline level of suspicion about the security of data and communications is very high these days. Are smart devices recording conversations and conveying them to marketers?
On October 10, 2019, the California Attorney General's office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. What are they, and what should enterprises do to achieve compliance and avoid costly fines?
On October 10, 2019, the California Attorney General’s (AG) office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. The AG’s office also announced that it will hold public hearings on the regulations on December 2-5.
Experian® has released its seventh annual Data Breach Industry Forecast, which predicts the top five threats businesses and consumers should be aware of in order to keep their information safe.
Research from iovation shows a 29-percent increase in suspected online retail fraud during the start of the 2019 holiday shopping season compared to the same period in 2018, and a 60-percent increase in suspected e-commerce fraud during the same period from 2017 to 2019.
To remedy the cybersecurity skills gap and fight data breaches, enterprises across the world are looking overseas. How can public-private partnerships help resolve the industry-wide issue?
Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.