IT Governance’s 2019 Cyber Resilience Report reveals major data protection weaknesses

IT Governance’s 2019 Cyber Resilience Report reveals major data protection weaknesses

Anti-malware technology is one of the most basic cybersecurity mechanisms that organizations should have in place, but according to IT Governance’s 2019 Cyber Resilience Report,…

View More IT Governance’s 2019 Cyber Resilience Report reveals major data protection weaknesses
New Allegations: Capital One Suspect Stole From 30+ Organizations

Capital One Suspect Stole From 30+ Organizations

The woman allegedly responsible for the massive breach of customer data at Capital One stole data from 30 other organizations, according to new information from…

View More Capital One Suspect Stole From 30+ Organizations
Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

At the end of last week, ESET’s security researchers disclosed the discovery of a new strain of malware that takes the trend for sextortion to a new…

View More Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording
New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report

New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report

It has been coming for some time, but now the major breach of a biometric database has actually been reported—facial recognition records, fingerprints, log data…

View More New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report

Even DSLR cameras are vulnerable to ransomware

Cameras are among the few devices that don’t connect to the internet, so you’d think they’d be immune to hackers. However, researchers have discovered that some DSLRs…

View More Even DSLR cameras are vulnerable to ransomware
Staffing the CISO office: A call to senior management for some expansive thinking

Staffing the CISO office: A call to senior management for some expansive thinking

We’ve come a long way from just a relatively few years ago in institutionalizing the CISO/CSO mandate across our respective corporate organizational structures. I’ve written…

View More Staffing the CISO office: A call to senior management for some expansive thinking
Four major dating apps expose precise locations of 10 million users

Four major dating apps expose precise locations of 10 million users

Four popular mobile applications offering dating and meetup services have security flaws that allow for the precise tracking of users, researchers claim. This week, Pen…

View More Four major dating apps expose precise locations of 10 million users
Microsoft and Reliance Jio team up in 10-year cloud deal to ‘transform Indian economy and society’

Microsoft and Reliance Jio team up in 10-year cloud deal to ‘transform Indian economy and society’

Indian network operator Reliance Jio has announced a 10-year partnership with Microsoft to utilize and promote Azure and ‘accelerate the digital transformation of the Indian…

View More Microsoft and Reliance Jio team up in 10-year cloud deal to ‘transform Indian economy and society’
The White House Readies Draft Of Executive Order That Could Break The Internet

The White House Readies Draft Of Executive Order That Could Break The Internet

It appears the Trump administration is drafting an executive order that has the potential to radically change how the content posted on social networks are…

View More The White House Readies Draft Of Executive Order That Could Break The Internet
New Vulnerability Risk Model Promises More-Efficient Security

New Vulnerability Risk Model Promises More-Efficient Security

Vulnerabilities happen. There’s nothing new or mysterious about that. Neither is there mystery around the fact that something must be done to address vulnerabilities. But…

View More New Vulnerability Risk Model Promises More-Efficient Security