Be the first to know
Get the latest information about data security and privacy.
The information contained on this page is the result of analytic efforts of the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) to provide technical details on the tactics, techniques, and procedures used by Chinese government cyber threat actors.
As organizations prepare for possible impacts of Coronavirus Disease 2019 (COVID-19), many may consider alternate workplace options for their employees.
A growing number of cyber criminals and other malicious groups online are exploiting the COVID-19 outbreak for their own personal gain, security officials in the UK and USA have revealed.
Infectious disease threats have the potential to endanger lives and disrupt economies, travel, trade, and the food supply. Outbreaks do not respect national boundaries and can spread rapidly jeopardizing the health, security, and prosperity of the United States.
2019 will be remembered as the year when major security bugs were disclosed in a large number of enterprise VPN servers, such as those sold by Pulse Secure, Palo Alto Networks, Fortinet, and Citrix.
The role of internet service providers (ISP) in protecting critical national infrastructure cannot be ignored. As Saudi Telecom Company (stc) Group's CEO Nasser Sulaiman Al Nasser stated during a recent cybersecurity conference:
NEW YORK, Jan. 21, 2018 /PRNewswire/ -- The 2018 Edelman Trust Barometer reveals that trust in the U.S. has suffered the largest-ever-recorded drop in the survey's history among the general population. Trust among the general population fell nine points to 43, placing it in the lower quarter of the 28-country Trust Index.
Congress is taking yet another stab at addressing the near-complete lack of federal laws covering the absolutely massive trove of data that companies now collect on every one of us, which forms the backbone of basically the entire big tech era.
In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices.
The will to earn higher profit drives any business. Attackers are sophisticated. They are organized. We hear these statements a lot but what do they mean to us? What does it mean to our businesses? When we dig deeper into the “business of hacking,” we see that the attackers have become almost corporate in their behavior.