Report Explores Child’s Data Safety Legislation Across 50 Countries
Comparitech report calls for further protection of children’s data online as legislation in many countries deemed insufficient Go to Source of this post Author Of this post:
India’s SpiceJet Strands Planes After Being Hit By Ransomware Attack
SpiceJet planes have been stranded following a ransomware attack on Tuesday Go to Source of this post Author Of this post:
18 Oil and Gas Companies Take Cyber Resilience Pledge
Energy corporations agree to cooperate on cybersecurity amid surging attacks on the sector Go to Source of this post Author Of this post:
Multi-Continental Operation Leads to Arrest of Cybercrime Gang Leader
The 37-year-old man is alleged to have spearheaded major phishing campaigns and business email compromise schemes Go to Source of this post Author Of this post:
Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete
New research shows companies are falling behind when it comes to developing strategies to protect themselves against cyber-attacks Go to Source of this post Author Of this post:
State of Cybersecurity Report 2022 Names Ransomware and Nation-State Attacks As Biggest Threats
Ransomware, nation-state attacks, and supply chains were cited as the biggest threats in the Infosecurity Group’s annual report Go to Source of this post Author Of this post:
Musings of a Former State CTO Part 1: The Origin Story
For decades, Claire Bailey has crusaded to combat threats to IT devices and networks. Her journey began in the early 1980s when a devastating personal experience inspired her to improve…
Security Orchestration Automation and Response (SOAR) Basics: Definition, Components, and Best Practices
Security Orchestration Automation and Response (SOAR) is a novel approach to incident response (IR) and post-incident recovery by using automated security processes and protocols. The SOAR concept was introduced by…
The 2022 Verizon Data Breach Investigations Report (DBIR) Is Out
On Tuesday, Verizon released its 15th annual Data Breach Investigations Report (DBIR), which, as usual, provides security professionals and executives around the world with an overview of global trends and…
A New Ransomware Variant Dubbed ‘Cheers’ Was Discovered
VMware ESXi is a hypervisor created by VMware that is of the enterprise-class and type-1 varieties. It is used for installing and servicing virtual machines. ESXi is a type-1 hypervisor,…