Three strategies to prove security's value

Three strategies to prove security’s value

Security executive Ricardo González doesn’t see IT security as a cost center; instead, he describes it as “a strategic investment in the reduction of corporate…

View More Three strategies to prove security’s value
Stolen NSA Hacking Tools Were Used In The Wild 14 Months Before Shadow Brokers Leak

Stolen NSA Hacking Tools Were Used In The Wild 14 Months Before Shadow Brokers Leak

One of the most significant events in computer security happened in April 2017, when a still-unidentified group calling itself the Shadow Brokers published a trove…

View More Stolen NSA Hacking Tools Were Used In The Wild 14 Months Before Shadow Brokers Leak
“An act of war”: Zurich American refuses to pay out on cyber insurance policy following NotPetya attack

“An act of war”: Zurich American refuses to pay out on cyber insurance policy following NotPetya attack

US food giant Mondelez is suing insurance company Zurich American for denying a $100 million (£76 million) claim filed after the NotPetya attack. The confectioner,…

View More “An act of war”: Zurich American refuses to pay out on cyber insurance policy following NotPetya attack