Don't let mistakes bother you

If you don't care, you may become a victim of spam

Third-party risk management can learn a lot from the musk ox

Third-party risk management is a significant CISO challenge with deep business consequences. When a key third-party […]

Avis reports data breach affecting 300,000 customers

Car rental company Avis has informed around 300,000 of its customers in the US that their […]

Want to get ahead? Four activities that can enable a more proactive security regime

Hockey legend Wayne Gretzky famously shared his secret to success on the ice: “I skate to […]

Protecting Against Business Email Compromise (BEC): A Comprehensive Guide

Business Email Compromise (BEC) attacks have emerged as one of the most sophisticated and financially devastating […]

What’s next after the CISO role?

Few roles have changed as much as the chief information security officer in the nearly 30 […]

Updating secure boot is crucial to keeping systems secure and working properly

New security features are great, but it’s inevitable that bad actors will eventually find ways around […]

Apache OFBiz patches new critical remote code execution flaw

Developers of Apache OFBiz, an open-source enterprise resource planning (ERP) framework, have released a patch for […]

Two weeks on from Pavel Durov’s arrest, Telegram ramps up moderation of ‘illegal content’

Less than two weeks after Telegram founder and CEO Pavel Durov’s high-profile arrest by French police, […]

Ransomware Attacks Reach Record Highs: Demands and Payments Continue to Soar

As IT complexity continues to rise, businesses are facing an increasingly challenging cybersecurity environment. Ransomware attacks […]

New malicious MS Office macro clusters discovered

CISOs with IT environments running older versions of Microsoft Office must upgrade immediately or risk the […]