Html Sitemap

Huawei Takes New Legal Step to Fight US Ban
EHR Vendor Penalized Again, This Time by States
Flipboard Resets Passwords After Database Intrusions
Mueller Reconfirms Russian Election Interference Campaign
Researcher Describes Docker Vulnerability
Sale of Recorded Future a Highlight of Big InfoSec M&A Week
The Growth of Adaptive Authentication
What CCPA Means to Security Leaders
Checkers, Rally's Burger Joints Hit By POS Malware
Microsoft Sounds Second Alarm Over BlueKeep Vulnerability
Audit Identifies Australian Health Sector Security Weaknesses
ISMG Fraud & Breach Summit: Seattle Edition Preview
First American Mortgage Faces NY Regulator Inquiry, Lawsuit
Quest Diagnostics: Data on 12 Million Patients Exposed
$74 Million Settlement of Premera Breach Lawsuits Proposed
Apple Emphasizes Privacy With Single Sign-On Feature
Australian National University: 19 Years of Data Copied
Hospital to Pay $250,000 After Alleged False HITECH Claims
7.7 Million LabCorp Patients Added to AMCA Breach Tally
8 Takeaways: European Data Protection Summit
Researcher Posts Demo of BlueKeep Exploit of Windows Device
BioReference Laboratories Added to AMCA Breach Tally
The Fight Against Malicious Bots
Baltimore Ransomware Attack Costing City $18 Million
Tech Data Says It Has Closed Off StreamOne Data Exposure
Feds Charge Four in New Darkode Case
GoldBrute Botnet Brute-Force Attacking 1.5M RDP Servers
Huawei Ban: White House Budget Chief Seeks Delay
Microsoft Warns of Large Spam Campaign Hitting Europe
Multiple Class Action Lawsuits Filed in AMCA Breach
Unsecured Database Leaves 8.4 TB of Email Metadata Exposed
US Border License Plate and Traveler Photos Exposed
The Shifting Sands of Financial Fraud
Boosting Secure Coding Practices
UK Man Sentenced for 2015 TalkTalk Hack
FIN8 Group Returns, Targeting POS Devices With Malware
The Challenge of Secure Coding
The Expanding Digital Attack Surface
Beyond Opportunistic: How the Threat Landscape Is Evolving
Addressing the Human Element in Cybersecurity
Are You APT-Ready? The Role of Breach and Attack Simulation
Do You Know What Cloud Assets You Actually Have?
Empower Employees While Preventing Insider Data Breaches
Best Practices for Session-Based Fraud Detection/Prevention
Google Researcher Details Windows Cryptographic Library Bug
Top Drivers for Privileged Account Management
Beyond Bug Bounties: Crowdsourced Security Testing Evolves
Proactive Mitigation: A Cybersecurity Imperative
Moving to a 'Zero Trust' Model
RH-ISAC's Role in Countering Threats
Fusing Security With Digital Transformation for SMBs
House Approves Lifting HHS Ban on Unique Patient IDs
Instagram Shows Kids' Contact Details in Plain Sight
Assange Extradition Hearing Won't Occur Until February
10 Highlights: Infosecurity Europe 2019 Keynotes
Alerts: Some BD Infusion Pumps Vulnerable to Remote Attacks
How Organizations Can Reduce Their Data Risk Footprint
Xenotime Group Sets Sights on Electrical Power Plants
2 Medical Practices Among Latest Ransomware Attack Victims
Enhancing Security by Red Teaming
GAO: After Equifax Breach, KBA No Longer Effective
DHS Is Latest to Warn of BlueKeep Vulnerability
Using AI to Detect Cyber Risks
Compliance in a Hybrid Environment
Securing the Software Supply Chain
The Scourge of Commodity Malware
Protecting Against Automated Attacks
How IT, OT Teams Can Collaborate
The State of the SOC
Network Security Policy Management: Seeking Visibility
OnDemand Webinar | Asset Management: The Toyota Camry of Cyber Security
Step Away From the Artificial Intelligence
Facebook's Libra Cryptocurrency Prompts Privacy Backlash
Cloud and Container Adoption: The Visibility Imperative
How to Block Advanced Threats
Cisco on Cybersecurity: Targeting Optimal Protection
4 Bug Bounty Myths Dispelled
Filling the Cybersecurity Skills Gap
The Pervasive Problem of Phishing
AMCA Bankruptcy Filing in Wake of Breach Reveals Impact
22 State Attorneys General Seek Election Security Help
Act Fast: Best Practices for Arresting Spoofed Domains
Best Practices for Cyberattack Prevention and Response
Cybersecurity's Automation Imperative
Troy Hunt: Why Data Breaches Persist
The Need for a 'Zero Trust' Approach
Mitigating Insider Threats With IAM
Reinventing Application Security
Oregon Agency's Breach Tally Nearly Doubles
Florida City Paying $600,000 to End Ransomware Attack
Life Beyond Blocking: Adopting Behavior-Based Cybersecurity
Hacked With Words: Email Attack Sophistication Surges
Privileged Attack Vectors: Key Defenses
NASA's Jet Propulsion Lab a Frequent Hack Victim: Audit
The Role of DNS in Cybersecurity
GDPR: Where Do We Go From Here?
DHS: Conflict With Iran Could Spur 'Wiper' Attacks
Alleged AlphaBay Moderator Faces Racketeering Charge
Chinese Hackers Play Operator With Global Telcos
How Gates Corporation Modernized Their Legacy IAM System
Sen. Wyden Asks NIST to Develop Secure File Sharing Standards
Improving IoT Risk Management
Police Arrest 6 in $28 Million Cryptocurrency Fraud Probe
How to Secure Custom Apps Without Code
Second Florida City Pays Up Following Ransomware Attack
Insurer: Breach Undetected for Nine Years
Cloud Hopper: Major Cloud Services Victims Named
CISO Sam Massiello on Gates Corporation's IAM Modernization Journey
Wipro Attack Tied to Larger Phishing Campaign: Analysis
Bill Proposes Easing HIPAA Enforcement Action in Some Cases
Certain Insulin Pumps Recalled Due to Cybersecurity Issues
ENISA Gets Permanent Mandate as EU Tackles Cybersecurity
Report: Huawei's Firmware Riddled With Problems
Ex-Equifax CIO Gets 4-Month Prison Term for Insider Trading
Italy Fines Facebook $1 Million Over Cambridge Analytica
UpGuard: Unsecured Amazon S3 Buckets Exposed 1 TB of Data
Can Patient Data Be Truly 'De-Identified' for Research?
Sophos Proof-of-Concept Exploit Shows Dangers of BlueKeep
More US Cities Battered by Ransomware
A 'Zero Trust' Approach for Health Data Security
Tips on Mitigating the Insider Threat
Health Data Breach Tally: A Mid-Year Update
Building an Email Security Strategy
Facebook Takes Down Pages Loaded With Malware
D-Link Settles With FTC Over Alleged IoT Security Failures
Report: Broadcom in Discussions to Buy Symantec
US Cyber Command Warns of Outlook Vulnerability Exploits
'Zero Trust' Adds Up to Better Security
Healthcare Security: Tactics for Reducing Risk
'Silence' Gang Tied to Bank Heist in Bangladesh - Report
Medical Device Security: The Manufacturer's View
Automated Peril: Researchers Hack 'Smart Home' Hubs
DDoS Attacker Austin 'DerpTrolling' Thompson Gets Sentenced
Mozilla Nominated for 'Internet Villain' by Angry ISPs
Wipe Away the Threat of Wiper Attacks
Hackers Slurp $500,000 Through 7-Eleven Mobile Payment App
Report: UK's Largest Forensics Firm Pays Ransom to Attacker
Medical Device Security: The CISO's View
Tackling Healthcare's IAM Challenge
Protecting Applications From Attacks
Devaluing Data to Protect It
Ethical Guidelines for AI, Machine Learning Development
Security Teams Confronting New Risks and Regulations
CCPA: The Start of a New Era of Consumer Privacy Laws?
Will California Privacy Law Be a Model for Other States?
CISO Notebook: Third-Party Risk
CISO Tackles the Accidental Insider Threat
British Airways Faces Record-Setting $230 Million GDPR Fine
HSBC Whistleblower on 'Too Big to Jail'
Breach Impact on the CISO
Blockchain Revisited: How Can It Reduce Fraud?
Ransomware Re-examined: To Pay or Not to Pay?
Medical Device Security: The FDA's View
Canonical Investigating Hack of Its GitHub Page
Open Source Genomic Analysis Software Flaw Patched
IAM's Role in the Pharmaceutical Sector
Securing Connected Medical Devices
Marriott Faces $125 Million GDPR Fine Over Mega-Breach
Mobile Device Management: Best Practices
Securing Devices While Maintaining Functionality
Best Practices for Device Security
Moving From Vulnerability Management to Vulnerability Response
Overcoming Vulnerability Overload
Malware on the High Seas: US Coast Guard Issues Alert
Zoom Reverses Course, Removes Local Web Server
Managing Third-Party Risks: CISOs' Success Strategies
Fieldwork Software Database Exposed Customer Data: Report
Building a Framework for Data Privacy
How to Protect SSH Keys
Researchers Disclose Vulnerability in Siemens' ICS Software
Certain Anesthesia Devices Have Vulnerabilities: Researchers
Apple Issues Silent Update to Remove Old Zoom Software
Cybersecurity Firm McAfee Preps for Public Market Return
MongoDB Database Exposed 188 Million Records: Researchers
Defending Against Application Breaches
RiskIQ: Magecart Group Targeting Unsecured AWS S3 Buckets
Premera Signs $10 Million Breach Settlement With 30 States
Report: Ransomware Targets QNAP Storage Devices
Software Engineer Charged With Stealing Company Secrets
FTC Reportedly Approves $5 Billion Facebook Fine
Payment Fraud: Criminals Enroll Stolen Cards on Apple Pay
'Sea Turtle' DNS Hijackers Expand Reach
Broadcom Reportedly Suspends Bid for Symantec
Phishing Campaign Tied to Amazon Prime Day
Security Flaw Exposed Valid Airline Boarding Passes
OnDemand Webinar | The Power of AI to Disrupt Security Ops
Insider Medicaid Fraud Case: 'An Important Reminder'
Senators Scrutinize Facebook's Cryptocurrency Plans
Ransomware: As GandCrab Retires, Sodinokibi Rises
Suspected Rubella Toolkit Mastermind Arrested
Bulgarian Authorities Arrest Suspect in Massive Data Breach
Impact of AMCA Breach Continues to Grow
Despite BlueKeep Warnings, Many Organizations Fail to Patch
Phishing Scheme Targets Amex Cardholders
Patient Record Snooping Incident Leads to GDPR Fine
Researchers Trick Cylance Into Giving Malware a Pass
Audit Finds More Security Vulnerabilities at IRS
Phishing Attack Aimed at Stealing Payroll Deposits
BEC Scams Cost U.S. Companies $300 Million Per Month: Study
Ireland Assessing Minors' Profiles on Instagram
Equifax Negotiates Potential $700 Million Breach Settlement
Ex-NSA Contractor Harold Martin Hit With 9-Year Sentence
Recent DNS Hijacking Campaigns Trigger Government Action
Consumer Advocates Criticize Equifax Settlement Plan
iNSYNQ Continues Recovery From MegaCortex Ransomware Attack
Yet Again, More Victims Added to AMCA Breach Tally
Attorney General Barr Argues for Access to Encrypted Content
FIN8 Group Returns, Targeting POS Devices With New Tools
It's Official: FTC Fines Facebook $5 Billion
Facebook Fixing Messenger Kids App Flaw
Why Hackers Abuse Active Directory
Mueller: Russian Interference 'Serious' Threat to Democracy
Essential Active Directory Security Defenses
Lawmakers, Privacy Advocates Slam FTC's Facebook Settlement
Health IT Groups Push for OK of National Patient ID Measure
Johannesburg Utility Recovering After Ransomware Attack
Louisiana Declares Emergency After Malware Attacks
OnDemand Webinar | Integrating Information Risk Management into Business Risk Management
Russia Targeted All 50 States During 2016 Election: Report
Secure the Core | Creating Resilient Business Applications
Massive Botnet Attack Used More Than 400,000 IoT Devices
Marcus Hutchins Spared Prison Time in Malware Case
No More Ransom Thwarts $108 Million in Ill-Gotten Profits
Ransomware Attack Impacts 522,000 Patients in Puerto Rico
Cloud Security Solutions for Government: Recorded at AWS Public Sector Summit
Code Triage: Why Healthcare is Facing More Cyber Attacks and How to Protect Your Organization
'Urgent/11' Vulnerabilities Affect Many Embedded Systems
Woman Arrested in Massive Capital One Data Breach
Report: LAPD Data Breach Exposes 2,500 Officer Records
Capital One: Where Did the Bank Fail on Defense?
Tackling the IAM Modernization Journey: Insights from CISO Sam Massiello
NY Attorney General Investigates Capital One; Lawsuits Loom
How to Make Your Containers More Observable
Mobile Ransomware Targets Android Users Through SMS
Judge Gives Go-Ahead for Settlement of Premera Breach Case
Pentagon Buys Equipment With Known Vulnerabilities: Audit
Visa Contactless Cards Vulnerable to Fraudsters: Report
Report Highlights Risk of Medical Device 'Workarounds'
GAO Blasts Cybersecurity Efforts of Federal Agencies
Cisco Settles Whistleblower Case for $8.6 Million
Capital One's Breach May Be a Server Side Request Forgery
MegaCortex Ransomware Demands Millions From Victims
Capital One Data Breach Spurs More Lawsuits
Health Data Breach Tally: The Latest Additions
Microsoft: Russia Probes Office Printers, VOIP Phones
How to Effectively Use AI and ML in Security
Kellermann: Hackers Emboldened by Lack of Prosecutions
Mobile-Only Bank Monzo Warns 480,000 Customers to Reset PINs
Business Email Compromise Targets Mental Health Provider
Making the Most of an Investment in Deception Technology
North Korean Hacking Funds WMD Programs, UN Report Warns
DOJ: Bribed AT&T Workers Planted Malware on Carrier's Network
More US Lawmakers Questioning Capital One, Amazon
Two More Lab Firms Say They Were AMCA Breach Victims
Medical Booking Firm Could Face Penalties for Selling Data
Baldr Credential-Stealing Malware Targets Gamers
State Farm Investigates Credential-Stuffing Attack
Addressing Opioid Crisis: A Call for Privacy Rule Changes
Democratic Campaign Group Left 6 Million Emails Exposed
Broadcom Reaches $10.7B Deal to Buy Symantec Enterprise
New Ursnif Variant Spreads Through Infected Word Documents
BlueKeep Patching Still Spotty Months After Alerts: Report
Allscripts Faces $145 Million Settlement With DOJ
Minimizing Automation Bias in Machine Learning
Digital Transformation: Security Best Practices
Apple Expands Bug Bounty; Raises Max Reward to $1 Million
Big Data Analytics' Role in Security
The Role of the Cloud in Updating Security
Understanding the Mindset of Attackers
Members of Chinese Espionage Group Develop a 'Side Business'
Unsecure Drivers Allow for Easy Windows Hacking: Report
Report: SEC Investigates First American Data Exposure
SQLite Vulnerability Permits iOS Hack: Report
Health Data Breaches Involving Unencrypted Devices Reported
Choice Hotels: 700,000 Guest Records Exposed
Microsoft Issues Patches for BlueKeep-Like Vulnerabilities
Crime Gangs Increasingly Turn to Online Fraud, UK Police Warn
AMCA Breach Victim Count Continues to Grow
Biometric Security Vendor Exposes Fingerprints, Face Data
Prosecutors Allege Capital One Suspect Stole From Many Others
Cloud Atlas Uses Polymorphic Techniques to Avoid Detection
Travel Card Data Release Risked Australians' Privacy
Phishing Scheme Uses Google Drive to Avoid Security: Report
European Central Bank Closes a Website Following Hack
Texas Pummeled by Coordinated Ransomware Attack
GAO: Army's New Cyber Units Understaffed and Underequipped
The State of API Security
Using AI to Proactively Address Third-Party Risk
Effectively Addressing Policy Change Management
Medical Device Security: The Doctor's View
FBI Arrests Nigerian Suspect in $11 Million BEC Scheme
Threat Intel for a Global Economy
Facebook and Twitter Scuttle Hong Kong Disinformation
Use of Facial Recognition Stirs Controversy
UK Police Investigations Still Affected by Ransomware Attack
Texas Says 22 Local Government Agencies Hit by Ransomware
Embrace Full-Scale Cloud Adoption with a Comprehensive Cloud Data Management Strategy
Fake VPN Website Delivers Banking Trojan
Why Did Federal Agencies See Fewer Breaches in 2018?
Cloud Security: Mess It Up and It's on You
For Sale on Cybercrime Markets: Real 'Digital Fingerprints'
'Silence' Gang Ramps Up Bank Assaults
Cyber Espionage Campaign Uses Spoofed Websites
VMware Acquiring Carbon Black to Boost Security Portfolio
Down and Out in Hacktivist Land
80 Indicted for Scams, Including Business Email Compromises
Chinese APT Groups Target Cancer Research Facilities: Report
Operation Soft Cell
Hostinger: 14 Million Accounts at Risk After Breach
Case Studies: Managing Identity With Blockchain
Hackers Hit Unpatched Pulse Secure and Fortinet SSL VPNs
Fraud: Why Payment Card Industry Must 'Get Its Act Together'
Improving Enterprise Security Team Effectiveness
Digital Identity: Top Challenges and Solutions
$1.1 Million in Cryptocurrency to Be Seized From Hacker
Emotet Botnet Shows Signs of Revival
Fighting Machine-Speed Attacks With Autonomous Response
How Machine Learning Can Mitigate Email-Based Attacks
IAM: Balancing Security With Employees' Needs
Cyber Insurance Changes as Threats Evolve
New Agency's Role in Protecting Critical Infrastructure
Advice for CISOs on Building a 'Personal Brand'
Insider Threats: Using Analytics to Mitigate Risks
Countering Spoofing Attacks
Apple Patches Reintroduced Flaw That Enabled Jailbreaking
HHS Proposes Changes to Substance Abuse Data Disclosures
Improving the Security of Connected Medical Devices
Advanced Threat Detection: Deception Tech's Role
Access and Identity: With 'Zero Trust,' Less Is More
Third-Party Risk Management Essentials
Mobile Workforce Security: Why 'Zero Trust' Is a Must
Identity: The New Enterprise Perimeter
Patch Management as a Risk Management Strategy
Sorting Through 'Zero Trust' Misconceptions
Election Security Program Aims to Mitigate Ransomware Risks
Tapping the 'Visibility Triad'
Making the Most of a 'Zero Trust' Security Approach
German Court Lifts Order Limiting Facebook Data Aggregating
Police Trick Malware Gang Into Disinfecting 850,000 Systems
Imperva Alerts Customers About 'Security Incident'
Facial Recognition Use Triggers GDPR Fine
AMCA Breach Tally Grows; Other Health Data Breaches Revealed
Sizing Up Impact of US Cyberattack Against Iran
Paige Thompson Charged With Hacking 30 Organizations
Cybersecurity: Building Better Teams
Magecart Group Continues Targeting E-Commerce Sites
TrickBot Variant Enables SIM Swapping Attacks: Report
Google, Medical Center Ask Court to Dismiss Privacy Lawsuit
Breach Saga: Bulgarian Tax Agency Fined; Pen Testers Charged
Apple iPhones Hacked by Websites Exploiting Zero-Day Flaws
Ransomware Attack Impacts Hundreds of Dental Practices
Lyceum APT Group a Fresh Threat to Oil and Gas Companies
Third-Party Risk Management: The Pitfalls
Keeping New York's Connected Infrastructure Secure
Foxit Software Breach Exposes Account Data
Hey Jack, How Was Your Account Hacked?
Kaspersky: Malware Found Hiding in Popular Android App
Third-Party Security: Guarding Against Complacency
iPhone Hacks May Be Linked to Broader China Spying
Huawei Accuses US Government of Hack Attacks
The Art of Deception
Responding to Threats Based on Business Risks
Strategies for Securing Digital Transformation
Satori Botnet Co-Creator Pleads Guilty
Mitigating the Risks Posed by Malicious Insiders
Third-Party Risk Management: NY DFS Regulation Compliance
Seeking Indicators of Behavior
Steve Katz on Reinventing the CISO
Web/Mobile App Security: What's 'Good Enough?'
Privacy Advocates Criticize FTC's Google Settlement
Faces of Fraud on a Global Scale
Facebook: 419 Million Scraped User Phone Numbers Exposed
Medical Devices: Finding the Risks
3 Critical Security Conversations
Whistleblower Turned Intelligence Director
Track the Trackers: GPS Devices Fail Security Tests
Cyber Defense: What Are We Missing?
Feds, Tech Giants Meet to Coordinate 2020 Election Security
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Health Data Breach Tally Spikes; AMCA Breach Reports Added
A Ransomware Tale: Mayor Describes City's Decisions
Expansion of DHS Continuous Diagnostics Program Considered
Arizona School District Cancels Classes Due to Ransomware
Chinese APT Group Began Targeting SSL VPN Flaws in July
EMV 3D Secure: Upcoming Milestones
Facial Recognition Use in UK Continues to Stir Controversy
Texas Ransomware Responders Urge Remote Access Lockdown
Alleged Capital One Hacker Pleads Not Guilty
SecOps Is Broken. What Can We Do About It?
Medical Device Cybersecurity: 3 Alerts Issued
Apple Accuses Google of 'Stoking Fear' With iOS Bug Report
Fixing IoT Leaks with Hardware Security
Wikipedia Investigates DDoS Attack
Software Bugs: Gotta Catch 'Em All?
Weaponized BlueKeep Exploit Released
Hospital Fined for Slow Records Release
Email Servers: Exim Flaw Leaves Millions at Risk of Hacking
Cybercrime Black Markets: RDP Access Remains Cheap and Easy
Avoiding Breach Notification Blunders
CISOs: Navigating Operational Conflicts
Hackers Attempted DDoS Attack Against Utility: Report
US Government Ban on Kaspersky Formalized
Business Email Compromise Crackdown: 281 Suspects Busted
Government Agencies Field More Cybersecurity Maturity Models
Microsoft Patches 2 Windows Flaws Already Being Exploited
Chinese APT Group 'Thrip' Powers Ahead
Ransomware Attack on Utah Clinic Affects 320,000
Iranian Hacking Group Continues Targeting Universities
Attacks Targeting IoT Devices and Windows SMB Surge
Australia to Update National Cybersecurity Strategy
National Patient ID Debate Intensifies
Cyber-Intelligence Firm NSO Group Tries to Boost Reputation
PSD2 Authentication Requirements: The Implementation Hurdles
Calif. May Ban Facial Recognition in Police Body Cameras
Credit Card Theft Ringleader Pleads Guilty
US Sanctions 3 North Korean Hacking Groups
Congress Hears Ideas for Battling ID Theft
Brokerage Firm Hit With $500,000 Data Breach Penalty
Report: Encrypted Smartphone Takedown Outed Canadian Mole
Investigation Launched After Ecuadorian Records Exposed
NIST Issues Draft Guidance for Securing PACS
Researchers: Emotet Botnet Is Active Again
Lumin PDF Leak Exposed Data on 24 Million Users
Adoption of AI Surveillance Technology Surges
Justice Department Sues Snowden Over Memoir
Senators Urge FCC to Review Licenses for Chinese Telecoms
Victim Total Soars in County Health Data Breach
Supply Chain Attacks: Hackers Hit IT Providers
Cryptoming Botnet Smominru Returns With a Vengeance
Facebook Removes Hundreds of Fake Accounts
2 Phishing Attacks Affect Presbyterian Health Plan Members
Phony IRS Emails Promise Refund, But Deliver Botnet Instead
Eight US Cities See Payment Card Data Stolen
Accused JPMorgan Chase Hacker Plans to Plead Guilty
Other Attackers Reuse Old Magecart Domains: Report
Report: FBI Subpoenaed Data From Banks, Credit Agencies
Senate Budget Bill Would Keep Patient ID Ban Intact
Google Calendar Privacy Concerns Raised
Facebook's Purge So Far: 69,000 Apps Suspended
Bulgarian Man Sentenced for Massive Phishing Scheme
Ransomware Attack on Rural Hospital Disrupts Services
JPMorgan Chase's Russian Hacker Pleads Guilty
Google Wins 'Right to Be Forgotten' Case
LookBack Malware Campaign Spreads to More US Utilities
OnDemand Webinar | How to Mitigate Insider Data Breaches
Emotet Botnet Now Using Snowden's Memoir as a Lure
Health Information Exchange Rule Raises Privacy Concerns
Kaspersky: Dual-Use Dtrack Malware Linked to ATM Thefts
Facial Recognition: Balancing Security vs. Privacy
Did GandCrab Gang Fake Its Ransomware Retirement?
NIST to Finalize Privacy Framework Soon
Russia-Backed APT Groups Compete With Each Other: Report
'Fancy Bear' Hacking Group Adds New Capabilities, Targets
xHunt Campaign Leverages New Tools Against Shipping Firms
Cisco: Hacking Group Targets US Veterans
Bill Would Kill Prospect of National Patient Identifier
DoorDash Says 4.9 Million Records Breached
Cryptocurrency Shakedown: Old Tactics, New Twist
Guilty Pleas in $29 Million Online Ad Fraud Case
GAO Raises Concerns About Power Grid Vulnerabilities
Senator Demands Answers About Exposed Medical Imaging Data
Apple iOS Has Permanent Bootrom Vulnerability
Former Army Contractor Gets Prison Term for Insider Attack
Rheinmetall Investigating Malware Attack at Three Plants
Report: US Voting Machines Still Prone to Hacking
Russian Troll Farm Targeted With Fresh US Sanctions
FDA Issues Alert on Medical Device IPnet Vulnerabilities
Bill Calling for DHS Cyber Incident Mitigation Teams Advances
UK Police Auction TalkTalk Hacker's Cryptocurrency Stash
Australian Medical Facilities Hit by Ransomware
Support for Expunging Huawei Gear From Carrier Networks Grows
Latest US Healthcare Ransomware Attacks Have Harsh Impact
'Vendor Email Compromise': A New Attack Twist
Report: 'PKPLUG' Espionage Campaign Targets Southeast Asia
OnDemand Webinar | Post-GDPR and CCPA: What Must Security Leaders Know about Privacy?
Senators Press Social Media Firms to Fight 'Deepfake' Videos
HHS Gives Dental Practice Posting PHI on Yelp a Bad Review
Cybersecurity 2020: The IoT Risks
Preparing for 5G
Canada 2020: The Cybersecurity Legal Landscape
Facebook Pressured Over Encrypted Messaging Plans
Toronto Sees 300% Increase in Ransomware Reports
Malware Most Foul: Emotet, Trickbot, Cryptocurrency Miners
Deception Detection: Spot the Liar
Just How Widespread Is Ransomware Epidemic?
Canada's 2020 Privacy Outlook
Preparing for Security in Cloud 3.0
Nigerian Man Charged in Phishing Scam Targeting US Agencies
Microsoft: Iran-Backed Group Targeted a Presidential Campaign
How to Prioritize Vulnerability Patching
Report: Android Banking Botnet Targeted Russians
Unpatched VPN Servers Targeted by Nation-State Attackers
New Card Fraud Countermeasures
Malicious Bots: Mitigating the Threat
How Google Is Using AI to Help Ensure Android App Security
Initial CCPA Compliance Costs Could Hit $55 Billion: Study
Addressing Privacy Compliance Challenges
Update: Internet Security Threat Report
Security Leaders Share Secret Sauce for Success with Digital Transformation
Implementing a 'Machine Speed' Response to Attacks
Regional Trends in Payment Fraud
Insider Threat Mitigation: Sanctions and Incentives
DevSecOps: Overcoming Resistance
Minimizing File Transfer Risk
The Case Against a 'SOC in a Box'
Health Data Breach Tally: Ransomware Proliferates
Log Management and Graylog Alerts- Keeping Track of Events In Real Time
Twitter Apologizes for Repurposing Phone Numbers
FBI: Cybercriminals Are Bypassing Multifactor Authentication
Preventing Election Interference: New Recommendations
HHS Proposes Allowing Cybersecurity Donations to Doctors
Volusion Payment Platform Sites Hit by Attackers
How Cybercriminals Continue to Innovate
Compliance: Mississippi State Agencies Have a Long Way to Go
Fighting Human Nature: How to Combat Socially Engineered Account Takeover Attacks
Hacked Off: Lawsuit Alleges CafePress Used Poor Security
Nation-State Hackers Greatest Threat to 5G Networks: Report
Singapore Man Charged in Large-Scale Cryptomining Scheme
Capital One Hacking Trial Delay Likely
On The Frontlines: Patch Management
Imperva's Breach Post-Mortem: API Key Left Exposed
Thoma Bravo to Buy Sophos for $3.9 Billion
CCPA Amendments Signed; Draft Regulations Released
Hepatitis Patients' Data Exposed
Pitney Bowes Says Ransomware Behind System Outages
Report: Hackers Spied on Moroccan Human Rights Activists
FIN7 Gang Returns With New Malicious Tools: Researchers
Libra Association Launched Amidst Defections, Congressional Scrutiny
'Silent Librarian' Revamps Phishing Campaign: Proofpoint
'Graboid' Cryptojacking Worm Spreads Through Containers
Ransomware Attacks: STOP, Dharma, Phobos Dominate
OCR's Severino Outlines Top HIPAA Enforcement Initiatives
Phony Company Used to Plant macOS Malware: Report
Open Cybersecurity Alliance: In Pursuit of Interoperability
Phorpiex Botnet Behind Large-Scale 'Sextortion' Campaign
Cybercrime Tool Prices Continue to Rise on Darknet Sites
Domain 'Typosquatting' Hits 2020 US Elections
Fresh Privacy Legislation Would Jail CEOs for Violations
Sodinokibi Ransomware Gang Appears to Be Making a Killing
Russia-Linked Cyber Espionage Group APT29 Remains Active
Malicious Tor Browser Fleeces Darknet Users of Bitcoins
Healthcare E-Commerce Site Breach Undetected for Years
Zappos' Offer to Breach Victims: A 10 Percent Discount
Russian Hackers Co-Opted Iranian APT Group's Infrastructure
Assange Denied Delay for US Extradition Hearing
Clinton Email Probe Cites 38 for Violations
NordVPN Says Server Compromised Due to Misconfiguration
Facebook Shuts Misleading Accounts Ahead of 2020 Election
Unsecure Database Exposed US Military Personnel Data: Report
Veterans' Data at Risk on Shared Network Storage Devices
Avast: Stolen VPN Credentials Led to CCleaner Attack Redux
PSD2 Authentication Deadline Extended: Here's What's Next
12-Year Prison Term for Hacking LA Court System
NCSC Investigated 658 Serious Cybersecurity Incidents
Florida Health System Slapped With $2.1 Million HIPAA Penalty
Congress Grills Facebook's Zuckerberg on Cryptocurrency Plans
Three Charged in $11 Million BEC Scam
Phishing Schemes Continue to Plague the Healthcare Sector
FBI Issues Payment Card Skimming Warning
Senators Push for FTC Probe Into Amazon Over Capital One
Here's Why 'Raccoon' Infostealer Is Popular With Criminals
42 Phony Google Play Apps Delivered Adware: Report
Johannesburg Struggles to Recover From Ransomware Attack
Senator Demands Review of How DHS Shares PII With Contractors
Two Data Leaks Expose Millions of Records
Clinics Serving Uninsured Hit by Ransomware
Fast-Food Chain Krystal Investigates Card 'Security Incident'
Joker's Stash Lists 1.3 Million Stolen Indian Payment Cards
Massive Cyberattack Slams Country of Georgia
Quest Diagnostics Proposed Breach Settlement Approved
Facebook Sues Spyware Maker Over WhatsApp Exploit
The Role of Biometrics and KYC in Seamless Onboarding
The Importance of Accessibility in The Digital Age
MSSPs: Surviving and Prospering in the New Network Security Reality
FCC Chair's Proposal Targets Chinese Technology Firms
Facebook Agrees to Pay UK Fine in Cambridge Analytica Case
Skimming Malware Found on American Cancer Society Webstore
Pwn2Own Contest to Focus on Industrial Control Systems
Combating Cybercrime: Key Challenges for 2020s and Beyond
Cyber Insurance: The Myths and Realities
Two Uber Hackers Plead Guilty
McAfee: Malicious Voicemails Target Office365 Users
HHS Updates Security Risk Assessment Tool
Trio of Web Registrars Disclose 22 Million Accounts Breached
Ransomware: Average Ransom Payout Increases to $41,000
Addressing Healthcare Security Challenges in 2020
Ransomware School: The Rise of GandCrab Disciples
OnDemand Webinar | Evaluating the Security of Software
Govt. Officials in 20 Nations Targeted Via WhatsApp: Report
The Rise of Bulletproof Proxies
Autonomous Response: A Game Changer?
Call for Action: Election Security a 'National Emergency'
BlueKeep Attacks Arrive, Bearing Cryptomining Malware
Ransomware Gangs' Not-So-Secret Attack Vector: RDP Exploits
ICO: UK Police Should Go Slow on Facial Recognition
Chinese APT Group Targets Mobile Networks: FireEye Mandiant
OnDemand Webinar | Exploring Third-Party Account Takeover Risk and What to Do About It
Beam Me Up, Alexa: Digital Assistants Hacked By Lasers
Goodbye, Symantec for Consumers; Hello NortonLifeLock
Latest BEC Victims: Nikkei, City of Ocala
Phishing Campaign Uses Salary Increase Ploy: Report
Business Email Compromise: Battling Advanced Attackers
Identity as the New Security Perimeter
Making Email Safe Again
Cyber Insurance: Benefits and Pitfalls
Overcoming Payment Declines: Recoup Revenue and Boost Conversions
OCR Issues Two HIPAA Enforcement Actions, Plus Adjusts Future Fines
The Malicious Macros Problem May Be Solved Soon
Alleged Capital One Hacker Released From Prison
Social Media Political Ad Ban Before UK Vote Sought
IT Misconfiguration Leads to 15 Breach Reports
Trend Micro Employee Sold Consumer Data to Scammers
Feds Allege Saudi Spies Infiltrated Twitter
Facebook: Developers Wrongfully Accessed User Data - Again
Bill Would Create a Federal Digital Privacy Agency
Cybersecurity at the Heart of the 4th Industrial Revolution
Identity Management: More Devices, Greater Complexity
Why a Data Breach Response Plan Is Essential
User Awareness Training: Improvement Still Required
Cybersecurity Success Rule No. 1: Prioritize Culture Change
Staying Ahead of Nation-State Cyberattacks
Sen. Wyden Pushes FCC on 5G Security
DOJ: Company Sold Gear With Security Flaws to US Military
Following Massive Breach, Capital One Replacing CISO: Report
Health Data Breach Tally Update: Top Causes
UAE Forms Defense Firm to Help Tackle Cyberthreats
Insider Threat: Greater Risk Mitigation Required
Data Breach Defense: Email and File Lockdown
Privacy Nirvana: Some Assembly Still Required
'Digital Climate Change': An Inconvenient Truth
Take Two: Why Organizations Are Reviewing GDPR Efforts
Democrats Pose Phone Data Privacy Questions to FCC
Microsoft Warns Users: Beware of Damaging BlueKeep Attacks
Sen. Warner Asks HHS for Answers on Unsecured Medical Images
Election Interference Notification Protocols Unveiled
Microsoft Will Apply California's Privacy Law Nationwide
Labour Party Hit by Massive Online Attack Attempt
New Ransomware-as-a-Service Offered at Deep Discount: Report
Privacy Analysis: Google Accesses Patient Data on Millions
Russian National Charged in Payment Card Scheme
Researchers Describe Significant Flaw in Intel's PMx Driver
Report Calls for Enforcing Voting Machine Standards
Ransomware: Mexican Oil Firm Reportedly Refuses to Pay Up
DOJ: Pair Used SIM Swapping Scam to Steal Cryptocurrency
Risky Dialing: Trump Call Raises Security Worries
7 Takeaways: Insider Breach at Twitter
Phishing Campaigns Spoof Government Agencies: Report
Roger Stone Found Guilty on All 7 Counts
Update: More Alerts About Medical Device Security Flaws
New JavaScript Skimmer Found on E-Commerce Sites
Compromised Website Led to Australia Parliament Hack
Senator Raises Concerns Over Insider Breach at Twitter
Watchdog Agencies Report on VA Privacy, Security Woes
OnDemand Webinar | 6 Steps to Securing Unstructured Data
This Time, Election Protection Bill Gets Bipartisan Support
Macy's E-Commerce Site Hacked
Anatomy of Credential Theft
Louisiana Government Recovering From Ransomware Attack
Bill Aims to Fill Consumer Health Device Data Privacy 'Gap'
Microsoft Moves Toward DNS Over HTTPS
Senators Call for a National 5G Coordinator
Ransomware Analysis: 'Shade' Surges; Other Trends Emerge
Microsoft Debunks DoppelPaymer Ransomware Rumors
Federal Reserve Report Raises Concerns About 'Stablecoins'
Target Sues Insurer Over 2013 Data Breach Costs
Twitter No Longer Wants a Phone Number for 2FA
Ransomware Attackers Leak Stolen Data
NeverQuest Banking Trojan Co-Creator Sentenced to 4 Years
Unsecured Server Exposed Records of 1.2 Billion: Researchers
T-Mobile Says Prepaid Accounts Breached
FCC Takes Steps Toward Squeezing Out Huawei, ZTE
Attackers Demand $14 Million Ransom From IT Services Firm
Auditor: Australia's Digital Health Records Need Improvement
Dell Considering Selling RSA: Report
Watchdog Finds DOE Falling Short on Cybersecurity
Magento Marketplace Suffers Data Breach, Adobe Warns
New US Federal Privacy Bill Proposed
Facebook Breach Victims Can Sue For 'Reasonable' Security
Security Firm Prosegur Hit By Ryuk Ransomware
Google: Government-Backed Hackers Targeted 12,000 Users
To Survive a Data Breach, Create a Response Playbook
Surviving a Breach: 8 Incident Response Essentials
Mixcloud Breach Affects 21 Million Accounts
TrueDialog Unsecure Database Exposes SMS Data: Report
Sentara Hospitals' HIPAA Settlement: Why $2.2 Million?
SAP Software Update Exposed New Zealand Firearms Register
New Malware Campaign Uses Trojanized 'Tetris' Game: Report
A Tale of Two Breach Lawsuits
FBI Warns of Smart TV Dangers
GOP Federal Privacy Bill Would Supersede CCPA
FaceApp Could Pose 'Counter-Intelligence Threat': FBI
Cybersecurity Defenders: Channel Your Adversary's Mindset
2 Phishing-Related Health Data Breaches Grow Even Bigger
Skimming Campaign Leveraged Heroku Cloud Platform: Report
Two Russians Indicted Over $100M Dridex Malware Thefts
Wiper Malware Targets Middle Eastern Energy Firms: Report
How to Make a Security Transformation
Balancing Digital Transformation and Security
Misconceptions About 'Zero Trust'
OnDemand Webinar | Using Security Ratings to Achieve Security Goals
8 Takeaways: Black Hat Europe's Closing 'Locknote' Panel
Banner Health Breach Lawsuit Settled
Decryptor Bug Means Ryuk Victims Stuck in Ransomware Rut
GDPR Violation: German Privacy Regulator Fines 1&1 Telecom
City of Pensacola Recovering From Ransomware Attack
Vietnamese APT Group Targets BMW, Hyundai: Report
Intel Chips Vulnerable to 'Plundervolt' Attack
Joker's Stash Celebrates Turkey Day With Stolen Card Data
McAfee Considers Purchase of NortonLifeLock: Report
Health Data Breach Tally: Trends in 2019
Five Charged in $722 Million Cryptomining Ponzi Scheme
Why We Need Quantum-Proof Keys
Managing Identity in a 'Zero Trust' Environment
Building Security Into Cloud Migration
Electrical Grid Cybersecurity Measure Advances
Scrutiny of Google's Access to Patient Data Intensifies
Georgia Wire Manufacturer Struck by Ransomware
North Korean Hackers Tapping Into TrickBot: Report
Securing the 2020 Election
Another Fine Tied to Patient Access to Records Announced
Keybase Nixes Stellar Airdrop After Spam, Fake Accounts
Ryuk Eyed as Culprit in New Orleans Ransomware Outbreak
Why Cyber Confidence Matters
The Lifecycle of Stolen Payment Data
Cybersecurity 2020: Connected Devices Strike Back
AI: 'We're Having the Wrong Conversation'
Visa: Gas Station Networks Targeted to Steal Card Data
Insurer Races to Fix Security Flaws After Whistleblower Alert
Payroll Data of 29,000 Facebook Employees Stolen: Report
Study: IoT Devices Have Alarmingly Weak RSA Keys
Mozilla: Firefox Add-On Developers Must Use 2FA
Fraud Prevention: Keeping Up With Attackers
Deciphering What 'Zero Trust' Really Means
The Growing Threat of Malicious Bot Attacks
Bill Spells Outs Steps to Help Schools With Cybersecurity
Security for Unstructured Data
Who Else Is in That Video Meeting? Maybe a Hacker
Cyber Ground Truth in the Financial Sector
Cyberespionage Campaign Spreads: Report
Canadian Lab Pays Ransom to 'Retrieve' Data
US Navy Memo Raised Cyberscurity Concerns About DJI Drones
Alleged Dark Overlord Member Extradited, Pleads Not Guilty
Judge: Government Can Collect Royalties From Snowden Memoir
New Orleans' Mission: Clean 4,000 Computers in 48 Hours
Facebook Wins an EU Privacy Ruling
5G Networks: Opportunities and Threats
How Apps Open the Door to Bots
Zero Standing Privileges in a Just-in-Time Framework
NIST's New Biometrics Databases Offer Help With IAM
Wawa Stores: POS Malware Attack Undetected for 8 Months
Database Left 267 Million Facebook IDs Exposed: Report
MyKings Cryptomining Botnet Leverages EternalBlue Flaw
Maze Ransomware Gang Names More Alleged Victims
Cybersecurity Leadership: The 2020 Vision
Three Members of GozNym Malware Gang Sentenced
The Promise and Reality of AI and ML in Security Management
Cybercrime Support: Victory for the Midmarket
What About Ransomware?
Building Cyber Resilience at a Foundational Level
MasterCard Inks Deal for Startup RiskRecon
Apple and Google Stop Distributing ToTok Messaging App
Phishing Scams Target Canadian Bank Customers
Ingredients of an Incident Response Playbook
Managing Open Source Components
Managing Third-Party Risks: CISO Insights
Citrix Vulnerability Could Affect 80,000 Companies: Report
Researchers: Chinese APT Espionage Campaign Bypasses 2FA
Will the US Get a Federal Privacy Law?
US Cybercom Considers Bold Election Security Moves: Report
Smart Home Device Maker Wyze Exposed Camera Database
Chivalric Disorder as Knight and Dame Data Goes Errant
US Coast Guard Warns Over Ryuk Ransomware Attacks
Ready for the New York SHIELD Act?
Report: Cloud Hopper Attacks Affected More MSPs
Microsoft Removes 50 Domains Tied to North Korean Hackers
Huawei: US Trade Ban Will Make 2020 'Difficult'
US Army Follows Navy in Banning TikTok App: Report
Restaurant Chain Landry's Investigates Malware Incident
Ambulance Company Slapped With HIPAA Fine
Researcher Spots New Tricks in Web Payment Card Skimmers
Maze Ransomware Victim Sues Anonymous Attackers
Cybersecurity Data Sharing: A Federal Progress Report
US Conflict With Iran Sparks Cybersecurity Concerns
Malware Infects Small Hospital's Medical Imaging Server
US Government Website Defaced With Pro-Iran Message
Analysis: Threat Posed by Pro-Iranian Hackers
FBI Investigating How Town Defrauded of $1 Million: Report
Lawsuit Filed in Wake of Ransomware Attack
Patch or Perish: VPN Servers Hit by Ransomware Attackers
Insight Partners' Latest Purchase: IoT Security Firm Armis
Accenture to Buy Former Symantec Services Unit From Broadcom
FBI Asks Apple for Access to Saudi Shooter's iPhones
Currency Exchange Travelex Held Hostage by Ransomware Attack
New York Man Gets 5-Year Sentence for ATM Skimming
TikTok App Had Major Security Vulnerabilities
Router Cryptojacking Campaigns Disrupted
Congressmen Call for Enhanced Financial Sector Security
UK Fines Dixons Carphone for Massive Breach
Hackers Increasingly Probe North American Power Grid
Facebook's FTC Privacy Settlement Challenged in Court
Georgia Man Charged With Making 'Fake' HIPAA Violation Claims
Voting Machine Firm CEOs Open to Greater Federal Oversight
Severe Citrix Flaw: Proof-of-Concept Exploit Code Released
'Cable Haunt' Modem Flaw Leaves 200 Million Devices at Risk
Albany Airport Pays Off Sodinokibi Ransomware Gang: Report
Baby's First Data Breach: App Exposes Baby Photos, Videos
Windows 7: Microsoft Ceases Free Security Updates
Attorney General Presses Apple to Unlock Shooter's iPhones
Report: Russian Hackers Targeted Ukrainian Gas Firm Burisma
NSA Uncovers 'Severe' Microsoft Windows Vulnerability
Equifax Settles Mega-Breach Lawsuit for $1.38 Billion
How Wireless Carriers Open the Door to SIM Swapping Attacks
HHS Reveals Draft of 5-Year 'Strategic Health IT Plan'
Senators Field Legislation to Build Huawei 5G Alternatives
Alarming Trend: More Ransomware Gangs Exfiltrating Data
Congress Hears Warnings of Iranian Cyberthreats
Windows Vulnerability: Researchers Demonstrate Exploits
BEC Fraudsters Targeting Financial Documents: Report
Aussie Bank Says Server Upgrade Led to Data Breach
FBI Promises 'Timely' Election Breach Reports for Officials
Cyberattack on a Major Bank Would Have Ripple Effect: Study
OnDemand Webinar | The Ripple Effect - An Examination of Multi-Party Security Incidents
'WeLeakInfo' Website Shut Down
Microsoft Warns of Zero-Day Internet Explorer Exploits
Bill Would Create State Cybersecurity Leader Positions
How Cybercriminals Are Converting Cryptocurrency to Cash
Ransom-Demanding Gangs Target Fresh Victims: Patients
Citrix Releases First Patches to Fix Severe Vulnerability
Mitsubishi Electric Blames Anti-Virus Bug for Data Breach
GDPR: $126 Million in Fines and Counting
Google CEO Backs EU's Proposed Facial Recognition Ban
Maryland Considers Criminalizing Ransomware Possession
Federal Breach Tally: 2020 Trends So Far
Report: Apple Scuttled Encryption Plans for iCloud Backups
BT and Vodafone Reportedly Want Huawei 5G Gear
Investigators: Saudis Hacked Amazon CEO Jeff Bezos' Phone
Documents Describe US Cyber Command's Campaign to Hack ISIS
Updated FTCODE Ransomware Now Steals Credentials, Passwords
Microsoft Error Exposed 250 Million Elasticsearch Records
Emotet Malware Alert Sounded by US Cybersecurity Agency
FBI Warns: Beware of Spoofed Job Application Portals
Treasury Wants to Collect More Cyber Risk Details From Banks
POS Vendor for Cannabis Dispensaries Exposed Data: Report
Stolen Payment Card Trafficking Mastermind Pleads Guilty
Hackers Target European Energy Firm: Researchers
UK Considers Limited Role for Huawei in 5G Rollout: Report
Vulnerabilities Found in Some GE Healthcare Devices
Police Bust 3 Suspected Magecart Hackers in Indonesia
US Agency Hit With N. Korean-Themed Phishing: Report
Ryuk's Latest Victim: Tampa Bay Times
Sen. Wyden Asks NSA About Trump Administration Device Security
Health Data Breach Not Reported for Seven Months
Are Companies Adhering to CCPA Requirements?
Ryuk and Sodinokibi Surge as Ransom Payments Double
UK Government Proposes IoT Security Measures
UK Approves 'Limited' Role for Huawei in 5G Networks
Why Was Electronic Health Records Vendor Fined $145 Million?
Wawa's Stolen Payment Cards Are Now for Sale
Fake Factory Experiment Illustrates Attackers' Tactics
NY Times Reporter Targeted by Spyware: Report
Court Invalidates Certain Patient Info Access Requirements
UN Kept Hacker Attacks Under Wraps
Zoom Fixes Flaw That Could Allow Strangers Into Meetings
Will UK's Huawei Decision Become a 5G Rollout Blueprint?
AlphaBay Moderator Pleads Guilty to Racketeering Charge
OnDemand Webinar | Practical Steps to Determine Your Data Breach Risk
Facebook Settles Facial Recognition Lawsuit for $550 Million
Interior Dept. Grounds Drones Over Cybersecurity Concerns
Long-Awaited HHS Data Sharing Rules Raise Privacy Worries
Avast Stops Using Security Software to Track Browsing Data
Judge Rules Insurer Must Pay for Ransomware Damage
6 Suspects Arrested in Maltese Bank Hacking Heist
Fake Coronavirus Messages Spreading Emotet Infections
Iowa Drops Trespassing Charges Against Penetration Testers
FCC: Wireless Carriers Violated Law by Sharing Location Data
TA505 APT Group Returns With New Techniques: Report
NIST Drafts Guidelines for Coping With Ransomware
Twitter Warns API Flaw Abuse May Have Unmasked Users
India Tests Instant Messaging Service for Government Workers
EU Likely to Drop Plan to Ban Facial Recognition
DoppelPaymer Ransomware Gang Threatens to Dump Victims' Data
California Man Pleads Guilty to Hacking Nintendo
YouTube Takes Steps to Stop Spread of Election Disinformation
Hackers Pose Increasing Risk to Medical Research Data
New Ransomware Targets Industrial Controls: Report
Australian Delivery Firm Confirms Ransomware Attack
Ireland's Privacy Watchdog Probing Google's Data Use
FBI Reportedly Says DDoS Attack Targeted Voter Registration
Report: Iowa Caucus App Vulnerable to Hacking
Fraudsters Pose as Journalist in Phishing Campaign: Report
FTC Shutters Hundreds of 'Fake' Websites
Joker's Stash Advertises Second Batch of Indian Card Data
Report: US Struggled to Counter 2016 Election Interference
Financial Firms Targeted With New Type of Backdoor: Report
Barr: US Should Invest in Nokia, Ericsson
OnDemand Webinar | IT & OT: a Bridge Too Far?
Coronavirus: HIPAA Compliance Issues
Facebook's Privacy Practices Targeted by Canadian Regulator
4 in Chinese Army Charged With Breaching Equifax
Was Internet in Iran Hit by DDoS Attack?
Coding Flaw Exposes Voter Details for 6.5 Million Israelis
More Phishing Campaigns Tied to Coronavirus Fears
WiFi: A New Way to Spread Emotet Malware
US Counterintelligence Outlines 5 Key Priorities
Unsecured Estee Lauder Database Exposed 440 Million Records
CIA Secretly Owned Swiss Encryption Firm for Years: Reports
States Press for Federal Resources to Fight Cyberthreats
Trump's Proposed HHS Budget: A Close Look
Service Provider to Government Left Database Exposed
FBI: BEC Losses Totaled $1.7 Billion in 2019
US Has Evidence of Huawei Backdoor: Report
RSA 2020: The Show Must Go On
Ransomware Hit a Florida Voting System in 2016
GDPR Compliance: Should CISO Serve as DPO?
Senator Calls for Creation of Federal Online Privacy Agency
Facebook Delays EU Dating Service Rollout After 'Dawn Raid'
US Charges Huawei With Stealing Trade Secrets
MIT Researchers: Online Voting App Has Security Flaws
Watchdog Agency: Improper Use of Medicare Data Rampant
Google Removes 500 Chrome Extensions Tied to Malvertising
Cybersecurity Plan for 2020 US Election Unveiled
Unpatched VPN Servers Hit by Apparent Iranian APT Groups
Dell to Sell RSA to Private Equity Firm for $2 Billion
Mobile Banking Users Targeted in SMS Phishing Campaign
Hacked Off: Patients Sue Ransom-Paying Hospital Group
Amazon's Ring Mandates Two-Factor Authentication
Canadian Government Breaches Exposed Citizens' Data: Report
Ransomware Attack Hit US Natural Gas Facility
Phishing Campaigns Tied to Coronavirus Persist
Health Data Breach Tally Update: 2020 Trends
Hackers Post Details on MGM Resorts Guests: Report
New Hacking Group Targets Gambling Firms: Report
GAO: Census Bureau Comes Up Short on Cybersecurity
Hacking of Accounting Firm Affects Medical Group
Facilities Maintenance Firm Recovering From Malware Attack
US, UK Blame Russia for Cyberattack in Country of Georgia
SMS Phishing Campaign Used to Spread Emotet: Report
Defense Department Agency Reports Data Breach
Ransomware Attack on EHR Vendor Impacts Home Health Chain
New Mexico Sues Google Over Children's Privacy
FBI Makes Arrest in DDoS Attack on Candidate's Website
BEC Group Favors G-Suite, Physical Checks: Report
Irish Privacy Report Gives Glimpse Into GDPR Investigations
Investing in Cybersecurity's Future
Closing the Tech Talent Gap
Lawsuit Claims HIV Data Exposed in Leak
Mitigating Threats to Operational Technology
The Ongoing Search for Indicators of Behavior
Next Cloud Security Challenge: Containers and Kubernetes
The Role of 'Zero Trust' in Pandemic Threat Management
The Financial Services Security Disconnect
Facebook Investigated Suspicious Pro-Sanders Content: Report
'Raccoon' Infostealer Now Targeting 60 Apps: Report
The Role of Self-Sovereign Identity Management
Addressing IAM Pain Points and Security Gaps
RSA President Rohit Ghai on 'The Human Element'
Reducing Security Complexity a Top Challenge for CISOs
CISA's Krebs: 2016 US Elections Were Cyber 'Sputnik' Moment
Australia Warns Finance Sector of DDoS Threats
Security and Privacy: Often Aligned, But Sometimes Not
Ransomware Attacks Growing More Targeted and Professional
Cloud Protection: How to Secure Server Environments
OnDemand Webinar | How CISOs Scale Their AppSec Programs
Sizing Up the Roles of Behavioral Analytics, 'Zero Trust'
The Business Side of Cybersecurity
Ransomware: Distraction and Destruction
Third-Party Risk: The Shifting Landscape
Experts Warn: Targeted Ransomware Attacks to Surge
OnDemand Webinar | Fighting Fraud With Connected Security
Supply Chain Risk in a Platform Economy
Israeli Marketing Company Exposes Contacts Database
Why The Cloud Is The New Network
The Need for a 'Collective Defense'
'Have We Been Compromised?'
How Machine Learning Can Strengthen Insider Threat Detection
The Year of Securing Identity
Ex-NSA Director Makes the Case for Collaboration
Former Microsoft Engineer Convicted of Insider Fraud
Architecting the Modern SOC
FCC to Fine US Carriers Over Location Data Sales
The State of Endpoint Resilience: Improvement Required
Zero Trust: Definitions, Practicalities, Challenges
How Cyber-Secure Is the Energy Infrastructure?
CISO Panel: Tackling the Insider Threat
Life Without Passwords
How to Make Security Smarter
Securing Digital Identity in Healthcare
The Role of Visualization in Vulnerability Management
Mobility 2020: New Visions for the Modern Workplace
Cloud Security: The Fast Evolution
The (Growing) Problem of Password Reuse
Encryption in a Multi-Cloud Environment
CISO Recruitment: What Are the Hot Skills?
5G Security: Former DHS Leader and Huawei CSO Offer Views
AI's Impact on SOC Maturity
Walgreens Mobile App Exposed Health-Related Messages
Security-as-a-Service Imperative: Predictive, Not Reactive
Beyond Black Box Results: Explainable Threat Intelligence
Careless and Malicious Insiders: The Threat Persists
Art Coviello on CISOs and the Board