Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process. The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through…
When companies consider the value of cybersecurity awareness training, they should be thinking about their cybersecurity responsibilities in an even more fundamental and comprehensive way.
As with any digital product, security relies on four arenas. User responsibility, corporate accountability, government regulation and industry standards.
We have partnered with it-sa365, a printed issue of Cyber Protection Magazine will be distributed there. And you can be part of it!
Everybody is going to own their own data. I’m going to own my own data. You going to own your own data. Your mother, your brother, your aunt, your uncle… we’re all going to own our own data. Those companies are going to have to pay royalties or license fees to use that data to train their models. The world is going in the opposite way.
Read our archived Newsletters here.
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party agreements.
Cyber warfare has been an open secret for many years, but the conflict in Ukraine has brought it out into the open. Listen to our Interview with Dr. Pano Yannakogeorgos of NYU’s Center for Global Affairs
Compared to large organizations, smaller suppliers with fewer security-aware employees are more likely to unwittingly click on a malicious website. This could have repercussions across the supply chain, triggering ransomware attacks on larger organisations. As a result, phishing has become one of the biggest threats to cybersecurity this year.
Stock prices are affected by changes in supply and demand, but also fluctuate with company health, economic reports, and trader sentiment. It’s no surprise that cyber attacks have an effect on stock prices, too.
Our first magazine is out – and we thought, we’d tease the content by publishing this article from our friends at BLST Security. This article gives an insight into different tools you can use for securing your APIs.
A new variant of one of the most infamous malware has been spotted in the wild. No need to panic – if you follow some basic cybersecurity hygiene.
Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.
Criminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it
With seemingly no end to the growing problem of cyberattacks in sight, the cybersecurity industry is increasingly looking to address the root of the problem; humans.
Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.
Today marks the 4th anniversary of GDPR. We spoke to eight experts and asked them, what changes the regulation brought.
In 2017 the largest ransomware attack in history – WannaCry – swept across the globe, infecting a quarter million machines in more than 150 countries. What lessons can be drawn from the attack, and how can businesses keep their systems secure?