Managing Cyber-Risk Is No Different Than Managing Any Business Risk
A sound cyber-risk management strategy analyzes all the business impacts that may stem from an attack and estimates the related…
Identity illuminated
A sound cyber-risk management strategy analyzes all the business impacts that may stem from an attack and estimates the related…
Antivirus vendor Kaspersky has formally begun pulling back its offerings in the U.S., migrating existing users to UltraAV, effective September…
SaaS applications contain a wealth of sensitive data and are central to business operations. Despite this, far too many organizations…
The latest version of the evolving threat is a multi-stage attack demonstrating a move away from ransomware to purely espionage…
Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are…
Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to…
Israel’s brazen attacks on Hezbollah last week, in which hundreds of pagers and two-way radios exploded and killed at least…
In a major policy reversal, the popular messaging app Telegram has announced it will give users’ IP addresses and phone…
The group has used more than 30 custom tools to target high-value government and telecommunications organizations on behalf of Iranian…
The company has jettisoned hundreds of thousands of unused apps and millions of unused tenants as part of its Secure…