Old-school awareness training does not hack it anymore. Get a product demonstration of the innovative Kevin Mitnick Security Awareness Training Platform. In this live one-on-one demo we will show you how easy it is to train and phish your users.
Members of Armenian civil society say they have received warnings from Apple regarding commercial spyware. John Scott-Railton, a senior researcher at The Citizen Lab, tweeted that "Apple threat notifications are 'clear & invaluable' signs something serious is going on."
SEC regulators have filed charges against software company SolarWinds and its CISO Tim Brown - accusing them of misleading investors about the firm's cybersecurity practices in light of a high-profile hack. Canon security leader Quentyn Taylor examined implications for other CISOs.
Tech firms are making huge investments in generative AI tools, but nearly half of cybersecurity professionals say they have little or no or knowledge of AI, according to ISC2's Cyber Workforce Study 2023, which surveyed 14,865 international security practitioners and decision-makers.
The Federal Trade Commission in an amended lawsuit complaint unsealed Friday details how Idaho-based data broker Kochava allegedly violated federal law by collecting and disclosing to third parties "enormous" amounts of geolocation and other sensitive information about consumers.
President Joe Biden's recent executive order on artificial intelligence could affect the healthcare sector in an assortment of ways, such as putting checks and balances on plans to promote AI innovation and wider use of AI - while also safeguarding against potential harms to patients.
The Department of Defense has published guidance calling for the rapid and responsible deployment of artificial intelligence systems across its entire enterprise while emphasizing continuous experimentation, iterative feedback loops between experts and users and enhanced data and analytics programs.
Safeguarding unmonitored channels is imperative. Chris Lehman, CEO of SafeGuard Cyber, highlighted the challenges enterprises face. No matter how many training or awareness programs are in place, Lehman said, "humans are always going to be the biggest wild card in your security strategy."
The data protection regulator of European country Liechtenstein rolled out new data processing guidance for large language model-powered chatbots such as ChatGPT. The primary legal basis for compliance will be the consent and transparency clauses of the GDPR, the agency said.
Corporate boards of directors are now mandated to take stronger roles in enterprise cybersecurity. That can be both good news and concerning. David Homovich of Google Cloud tells how to turn board interest into a positive relationship to improve crisis communication and defenses.
Palo Alto Networks announced its second acquisition in a week, scooping up the 2022 winner of RSA Conference's prestigious Innovation Sandbox contest. The proposed buy of Talon Cyber Security will enable users to securely access business applications from any device, including noncorporate devices.
Federal agencies and Defense Industrial Base organizations need to protect data. They can use the CMMC program, the DOD Zero Trust Strategy, the cybersecurity Risk Management Framework and NIST SP 800-53 with built-in security solutions to mitigate data loss and insider risk.
When it comes to cloud security in financial services, this expert panel agrees: What you don't know can hurt you. Learn of new "security by design" strategies and solutions from Vice President Erika Voss, Ph.D.; Alicja Cade of Google Cloud; and Anthony Belfiore from Wiz.
Days after announcing a security compromise, cloud-based identity and authentication management provider Okta said that an unknown threat actor had accessed files of 134 customers after an employee signed in to a personal Google profile on the Chrome browser of an Okta-managed laptop.
Atlassian added new urgency Thursday to a warning that customers with on-premises Confluence servers should patch immediately to protect against a vulnerability that attackers could exploit to destroy data. A publicly available exploit now exists for the vulnerability, tracked as CVE-2023-22518.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.