Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy on journalists, activists and world leaders (see Apple Se...
Cyberattacks caused by supply chain vulnerabilities mean organizations need a renewed perspective on how to address third-party security.
In a developing market, third-party risk management (TPRM)...
The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data i...
The National Security Council is sending a memo to U.S. companies urging them to take the ransomware threat more seriously as the Biden Administration ramps up its responses following recent attacks l...
The explosion of ransomware and similar cyber incidents along with rising associated costs is convincing a growing number of insurance companies to raise the premiums on their cyber insurance policies...
The European Union's new General Data Protection Regulation (GDPR) has ushered in sweeping new data privacy and security regulations – and with it a new way of doing business for secur...
When the California Consumer Privacy Act (CCPA) – sometimes referred to as AB-375 – takes effect on Jan. 1, 2020, it will impose a host of obligations on all but the smalles...
The EU's General Data Protection Regulation (GDPR) was implemented a year ago on May 25, 2018. The sweeping data privacy law offers individual users the "right to be forgott...
The EU's General Data Protection Regulation (GDPR) took effect on May 25, 2018. If your company is not in compliance by now, you risk incurring significant financial penalties.
Still, more than 50 ...
The daily challenge for many IT leaders is figuring out how to deal with a constant barrage of security risks and an ever-growing?regulatory compliance landscape.It's a challenge Alissa Johnson has ...