A recent survey by the Bank of England revealed that cyber-attacks were the joint second most cited risk to the…
Browsing: Strategy and Planning
On May 25th, the FBI recommended that all U.S. households and small businesses reboot their internet routers, due to infection…
Please see below for comment from Trustwave regarding a key committee of the European Parliament approving a draft Cybersecurity Act…
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top…
Today IBM released IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses. Ilia Kolochenko, CEO and founder of web…
The discovery of stolen code signing certificates used in a new malware campaign in Taiwan. Kevin Bocek, Vice President of Security…
The popular mobile app Timehop, which surfaces users’ social media posts from the same date in previous years, has been breached, exposing the credentials, phone numbers…
Analysts Will Explore the Trends Security Leaders Face During the Gartner Security & Risk Management Summit, 10-11 September 2018, London, UK…
For years, cybersecurity was considered a “check-the-box” discussion during the merger and acquisition (M&A) process. It was almost always examined…
With the GDPR deadline now passed, the sigh of relief from IT departments up and down the country was almost…