Customer personally identifiable information (PII) exposed in the security breach includes the affected individuals' names, addresses, social security numbers, dates...
Risk Management
As reported by Swiss German-language newspaper Aargauer Zeitung, the lack of security on smart toothbrushes has now resulted in millions...
The FTC's complaint alleges that the company "failed to monitor attempts by hackers to breach its networks, segment data to...
Following his dismissal, Brody allegedly refused to return his work laptop and instead used his still-valid account to access the...
The ALPHV/BlackCat ransomware operation has taken extortion to a new level by filing a U.S. Securities and Exchange Commission complaint...
The Securities and Exchange Commission (SEC) announced on Monday evening that it plans to charge SolarWinds Chief Information Security Officer...
CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a...
Recent estimates put the shortage of cybersecurity professionals at 3.5 million. The survey demonstrates that in addition to the mental...
One of the main goals of CSF is to allow organizations to build their cybersecurity strategy by identifying risk and...
Strict internet privacy laws like the GDPR and CCPA make a consent management processor compulsory for any website targeting European...