A Senate subcommittee found that Equifax failed to comply with standard cybersecurity measures that should be taken to protect customer information.
Popular Tags within: Network SecurityProducts Cyber Security Digital Signage Hardware Cyber Attacks Artificial Intelligence Legal Speakers Week in Review Meeting Space
As the federal government discusses the possibilities of law on data privacy, some states are taking legislation into their own hands and introducing bills at the state level.
Enterprise Security Management can be purchased as an add-on to Slack Enterprise Grid; gives you control over encryption keys.
According to PC Mag, today’s hackers are getting younger and richer, like Argentina native Santiago Lopez. A member of HackerOne, a platform that hires digital bug catchers to find security vulnerabilities in IT systems for certain companies, Lopez has found over 1,600 security flaws, and earned over $1 million doing it. He’s scanned security risks […]
If Jackson County had not paid its hackers their ransom, it would have wasted workers’ time and more money before getting back to business as usual.
What types of cyberattacks were carried out this week, March 22, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.
Chinese companies are costing the U.S. hundreds of billions of dollars every year because of infringements on intellectual property and American IP addresses.
Despite the fact that they have stepped down regarding nuclear weapons, cyber attacks on Western entities remain a dangerous staple in North Korea’s military strategy.
Many companies are allowing employees to work remotely more frequently as a recruitment and retention strategy, but that can’t interfere with the security of the company’s network.
Twistlock Expands Cloud Native Cybersecurity Platform for Hosts, Containers and Serverless in a Single Product
Latest release of Twistlock adds cloud workload cybersecurity platform for full vulnerability management, compliance, runtime defense, firewalling and granular access control across all hosts in all clouds.