Ransomware hacks and self-declared hacktivist denial-of-services attacks were the most prolific threat to European Union ...
Multiple makers of third-party Apple security tools, including CrowdStrike and SentinelOne, are warning users not to upgrade ...
As cloud computing, DevOps and automation continue to evolve, the lines between IT functions are fading, making security ...
Koh is a thought leader, and risk, compliance and governance expert with more than 25 years of experience covering banking, finance, cards and payment sectors. He has worked in various risk management ...
The healthcare sector is plagued by increasingly complex cyberthreats, and simply meeting compliance standards is not doing ...
Apple wants to dismiss its 2021 lawsuit against Israeli spyware maker NSO Group out of concern that continuing the lawsuit ...
U.S. federal prosecutors indicted a Chinese national employed by a state-owned aerospace and defense conglomerate with a ...
Your personal information is continuously harvested and analyzed by countless data brokers eager to sell to the highest bidder. From your name to your online activities, to your employment details and ...
Russian state media faced a new round of federal sanctions Friday after the United States accused a Kremlin news outlet of secretly orchestrating a fundraising campaign to provide support and military ...
Apps have become the new endpoint for the modern enterprise, driving productivity, revenue, and customer engagement. Globally, approximately 4 billion iOS and Android mobile devices are in use, with ...
Piling on remote access tools, especially tools without functionality such as auditing, isn't great for operational technology security. (Image: Shutterstock) Excessive deployment of remote access ...
Regulatory requirements can become a burden and paperwork drill. Regulatory compliance does not always mean more secure systems. We are fighting a cyberwar and need to focus our efforts and attention.