
Third-party risk management can learn a lot from the musk ox
Third-party risk management is a significant CISO challenge with deep business consequences. When a key third-party […]

Avis reports data breach affecting 300,000 customers
Car rental company Avis has informed around 300,000 of its customers in the US that their […]

Want to get ahead? Four activities that can enable a more proactive security regime
Hockey legend Wayne Gretzky famously shared his secret to success on the ice: “I skate to […]

Protecting Against Business Email Compromise (BEC): A Comprehensive Guide
Business Email Compromise (BEC) attacks have emerged as one of the most sophisticated and financially devastating […]

What’s next after the CISO role?
Few roles have changed as much as the chief information security officer in the nearly 30 […]

Updating secure boot is crucial to keeping systems secure and working properly
New security features are great, but it’s inevitable that bad actors will eventually find ways around […]

Apache OFBiz patches new critical remote code execution flaw
Developers of Apache OFBiz, an open-source enterprise resource planning (ERP) framework, have released a patch for […]

Two weeks on from Pavel Durov’s arrest, Telegram ramps up moderation of ‘illegal content’
Less than two weeks after Telegram founder and CEO Pavel Durov’s high-profile arrest by French police, […]
Ransomware Attacks Reach Record Highs: Demands and Payments Continue to Soar
As IT complexity continues to rise, businesses are facing an increasingly challenging cybersecurity environment. Ransomware attacks […]

New malicious MS Office macro clusters discovered
CISOs with IT environments running older versions of Microsoft Office must upgrade immediately or risk the […]