Lessons from the GitHub Cybersecurity Breach: Protecting the Most Sensitive Data
This Tech Tip outlines three steps security teams should take to protect the information stored in Salesforce.
This Tech Tip outlines three steps security teams should take to protect the information stored in Salesforce.
The hacker who claimed to have breached Optus and stolen the data of 11 million customers has withdrawn their extortion…
Ukraine military intelligence says Russia is planning cyberattacks on the country's energy sector, as well as against allies including Poland…
Cybersecurity Workforce Certificate Program By Stephen Patrick, Marketing Coordinator at the University of Louisville According to the Identity […] The…
Company unnecessarily collected consumers' personal data and failed to safeguard it, suit alleges, leading to two back-to-back data breaches.
American Airlines says its Cyber Security Response Team (CIRT) found out about a recently disclosed data breach from the targets…
American Airlines says its Cyber Security Response Team found out about a recently disclosed data breach from the targets of a…
This week we saw some embarrassment for the LockBit ransomware operation when their programmer leaked a ransomware builder for the…
The bug allows unauthenticated code execution on the company's firewall products, and CISA says it poses "significant risk" to federal…
SecurityScorecard's ROI Calculator helps organizations quantify cyber-risk to understand the financial impact of a cyberattack.