Initially the company said hackers stole business documents. Now it’s saying the stolen information may have included names, Social Security...
Posts
Where would PR pros be without reputation-damaging blunders—without clients who step in it, shoot themselves in the foot, or face-plant...
Compliance officers often lament that it is impossible to identify, assess and manage the compliance risks of financial relationships they...
It's once again the time of year when physicians and teaching hospitals have a short window of opportunity to review...
“Historically, most varieties of ransomware have required some form of user interaction, such as a user opening an attachment to...
When storms move into the Kansas City area, emergency managers spread mottos like “turn around, don’t drown,” and “when thunder...
It's tempting to believe that important data breaches only happen in the US and the figures tend to bear that...
The Justice Department has now intervened in the case after conducting its own extensive investigation -- a sign that the...
In the world of data security, when it rains, it pours -- and the leaks just keep coming. We've gone...
This is bad, but it gets worse. Normally, when the user scrolls up, Chrome will re-display the true URL bar....