The U.K. is preparing to revamp the country's data protection and privacy laws as a way to spur economic growth and innovation in its post-Brexit economy, according to government officials. While some British politicians see opportunity, privacy experts worry about moving away from EU standards.
Given that budgets and time are finite, how can organizations best identify if their information security strategy is well balanced and appropriate? Nandhini Duraisamy, chief operating officer of Quadron Cybersecurity Services, shares best practices.
Users of OpenSea, a marketplace for blockchain-based digital assets such as crypto collectibles and non-fungible tokens, are being targeted by scammers pretending to be the company's support staff on Discord. The attackers exploited a method OpenSea uses to service support tickets on Discord.
Although research firm Gartner forecasts that spending on cybersecurity will surpass $150 billion in 2021, "the proportion of investment going to companies raising investment for the first time is significantly down," says Saj Huq, director of cyber innovation at Plexal, a center for innovation in the U.K.
A necessary pillar of an effective cyber defense strategy is the capability to detect and mitigate threats at the earliest stages of the cyber kill chain. While internal and perimeter security solutions are critical to your security program, external threat intelligence gives you the ability to defend forward by...
The U.S. Securities and Exchange Commission will monitor decentralized finance transactions, after contracting with the blockchain cybersecurity firm AnChain.AI. Legal experts suggest this and other recent moves preview increased regulation of the decentralized finance space.
As organizations find themselves amid cloud migration, what should they be discussing in regard to what they want to move to the cloud and how to protect identities? CyberArk's Khizar Sultan offers his vision of a migration road map and milestones.
Microsoft is warning of a "widespread" phishing campaign in which fraudsters use open redirect links to lure users to malicious websites to harvest Office 365 and other credentials, according to a recent report. In some cases, the attackers deploy a malicious CAPTCHA verification page.
The Department of Defense did not effectively control access to the health information of high-profile personnel, says a new watchdog agency report, which hints that the findings also may indicate ineffective access control over other DoD employees' health records.
Bangkok Airways issued an apology late last week for a data breach that apparently compromised the personally identifiable information for an unstated number of its passengers. The LockBit ransomware gang claimed credit for the attack.
Local officials with the city of Rolle, located near Lake Geneva in Switzerland, have acknowledged that they initially misjudged the impact of a recent ransomware attack that reportedly led to the leak of residents' data on the darknet.
Sen. Pat Toomey of the Senate Banking Committee is requesting input from the cryptocurrency and blockchain community to inform future legislation on its security and privacy. Several experts praise efforts to regulate the space, but cite its complexities.
A recently uncovered phishing campaign used fake COVID-19 vaccination forms - and took advantage of confusion over whether employees will return to their offices this fall - to harvest workers' email credentials, according to analysts with security firm INKY. The malicious messages appear to come from victims' HR...
As initial consumer reactions to the COVID-19 pandemic settled into durable, more defined buying behaviors in the second half of 2020, the importance of a robust and seamlessly connected omni-channel ecosystem became evident.
The FBI has issued a warning about Hive ransomware after the group took down Memorial Health System last week. The alert details indicators of compromise, tactics, techniques and procedures associated with these ransomware attacks to help organizations better defend themselves.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.