QuSecure Inc. has formally launched as the first company to offer an end-to-end, quantum resilient orchestration platform.
Zscaler, Inc. recently released the findings of its 2022 ThreatLabz Phishing Report that reviews 12 months of global phishing data from the Zscaler security cloud to identify key trends, industries and geographies at risk, and emerging tactics.
The Identity Theft Resource Center (ITRC), a nationally recognized nonprofit organization established to support victims of identity crime, released its U.S. data breach findings for the first quarter (Q1) of 2022.
The proliferation of cyber-offensive capabilities has been thoroughly discussed in recent years by academics and think tankers alike.
- By Omer Carmi
- May 05, 2022
Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).
- By Dave Krauthamer
- May 02, 2022
Organizations have an opportunity to reduce their third-party risk by clarifying whether they or their suppliers are responsible for supply chain risk management, according to new global research of 1400 cybersecurity decision makers by NCC Group.
Few sectors face higher regulation and compliance standards in the United States than the aviation industry.
- By Kevin Tomich
- Apr 01, 2022
Protected Harbor, a full-service IT solution and consulting firm, just announced the launch of its latest whitepaper on healthcare cybersecurity. The whitepaper, entitled “2021 Healthcare Data Breach Trend Report” offers readers an insight into evolving healthcare data breach patterns, predictive threats for 2022, and a playbook on how to increase IT durability to stop future healthcare data attacks.
Cyber criminals are not picky and cyberattacks are inevitable. They will target your organization regardless of industry, revenue, or how long it has been operating. Cyberattacks have been carried out on large corporations and small businesses, in medical and healthcare, education, government, transportation – the list goes on
- By Bryan Kaplan
- Mar 07, 2022
The Financial Services Industry has long been a lucrative playground for cyber thieves. These days, the push toward a digital banking economy has opened financial institutions to an overwhelming number of new and sophisticated cyberattacks.
- By Skip Sanzeri
- Mar 07, 2022
Artificial Intelligence (AI), Machine Learning, Deep Learning, and Computer Vision are the latest buzzwords spreading throughout the security industry.
- By Quang Trinh
- Mar 01, 2022
The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint Cybersecurity Advisory titled, “Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology.”
Code42 recently released its Annual Data Exposure Report for 2022 on Insider Risk. The study, conducted by Vanson Bourne, found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft.
The PCI Security Standards Council (PCI SSC) and the National Cybersecurity Alliance issued a joint bulletin on the increasing threat of ransomware attacks.
Times have started changing for the better in the U.S. cybersecurity world. After years of minimal effort to get together to discuss cyberattacks and breaches and share some pertinent data, big companies and the federal government have finally started to collaborate on mitigating big cybersecurity issues.
- By Robert R. Ackerman Jr.
- Feb 08, 2022
For a variety of reasons, cybersecurity experts are urging caution as we enter 2022.
- By Allen Drennan
- Feb 07, 2022
The unpredictable shortage of goods because of pandemic-triggered supply chain problems is broad: plastic cup lids, woodworking tools, paper goods, and lumber, to name a few.
- By Greg Yarrington
- Feb 07, 2022
We sat down with Bala Kumar, CPO of Jumio, to discuss balancing the customer and fraud prevention.
Many governments and industries worldwide have mandated that various forms of personal data be protected by encryption while at rest or in transit.
- By Richard Kanadjian
- Feb 07, 2022
In a recent report by the World Economic Forum, Building Resilience in Manufacturing and Supply Systems in the COVID-19 Context and Beyond suggests that manufacturers adopt new working models and governing to increase manufacturing resilience.
- By Alvis Chen
- Jan 27, 2022