Industry | News, how-tos, features, reviews, and videos
The US Securities and Exchange Commission’s aggressive new rules mark a profound regulatory shift in how businesses are now required to manage their cybersecurity risks.
When bad actors get control of business or corporate accounts, it can be more dangerous than comprised personal or consumer accounts. Here are some ways to stop them.
At the Black Hat and DEF CON conferences, Viasat and the NSA offered detailed accounts about what went down when Russian hackers shut off tens of thousands of satellite broadband modems in the Ukraine war’s first significant cyberattack.
Check Point Software will integrate Perimater 81's zero trust network access and rapid deployment technology into its existing Infinity product architecture.
The solution enables governments to build cybersecurity skills and capabilities and facilitate knowledge sharing and collaboration.
The Hack4Values bug hunting program will onboard European NGOs and nonprofits to help them keep their data secure from cyber threats.
Kyndryl’s new managed security services include managed detection and response (MDR) and security information and event management (SIEM).
The new SEC rules also require registrants to report ransomware payments within 24 hours to report ransomware payments and to submit annual cyber risk management, strategy, and governance reports.
Mandiant research has attributed the hack to UNC4899, a Democratic People’s Republic of Korea (DPRK) threat actor, with a history of targeting companies within the cryptocurrency vertical.
With lower budgets and staffing challenges, cities and municipalities must weather a host of difficulties not faced by their corporate brethren. But there are resources out there for local governments.
Sponsored Links