Security News

  1. U.S. critical infrastructure has become a popular cyberwarfare target. The weak underbelly has been aging tech and industrial control systems (ICSs) which may lack adequate physical and cyber security...
  2. We have focused on the latest laws protecting PII in the United States, Regulation through Global Data Protection and Security Laws, and APAC Data Protection and Security Laws. This is an overview of...
  3. Cyber security is one of many risk functions within an organization, but the various functions may not work together as closely as they should to collectively lower the company's risk profile. Securit...
  4. Incident is reflective of an evolution of ransomware attacks, from encrypting files and demanding ransom money for a decryption key to encrypting the file and threatening to publish the information if...
  5. There were three prevalent themes- hygiene, humans and automation. On hygiene- time and time again, presenters suggested that it doesn't matter what you do, it doesn't matter what you implement and it...