EasyJet has admitted that a “highly sophisticated cyber-attack” has affected approximately nine million customers. It said email addresses and travel details had been stolen and…View More EasyJet Admits Nine Million Customers Hacked
C-suite executives are turning to AI and machine learning-based security solutions to combat threats, according to an Oracle report. Despite advancing threats from hackers and…View More Why human error is still the top cybersecurity risk for organizations
A security researcher has discovered a novel way to steal data from a PC that isn’t connected to a network (air-gapped) by manipulating the brightness…View More Malware Steals Data By Adjusting Screen Brightness
Washington legislators recently introduced the Washington Privacy Act (WPA). This legislation is a consumer-focused privacy law similar to the California Consumer Privacy Act (CCPA) but it also…View More How The Washington Privacy Act Compares To GDPR And CCPA
Some time ago a friendly colleague reached out to me asking about ISO 27001. The questions were simple but got me thinking. I then realized…View More What Is ISO 27001, ISMS and Do We Need It?
Hackers are actively searching the internet and hijacking smart door/building access control systems, which they are using to launch DDoS attacks, according to firewall company…View More Hackers are hijacking smart building access systems to launch DDoS attacks
Cybercriminals are using global fears about the virus to spread the Emotet trojan. Researchers with IBM X-Force and Kaspersky have discovered that cybercriminals are spreading…View More Hackers using coronavirus scare to spread Emotet malware in Japan
If you think writing a bunch of information security documents is enough to get ISO 27001 certificate, you’re wrong. You need to implement all the activities described…View More Becoming ISO 27001 certified – How to prepare for certification audit
These days it seems like there are security solutions for almost everything except, the one thing you can never fully secure – humans. But, while…View More What are the 3 Most Common Access Risks?
Target is suing its insurer for costs of up to $74M that were incurred as a result of a data breach. America’s eighth-largest retailer claims…View More Target Sues Insurer Over Data Breach Costs