In part two of the FiRe conference review, we continue our session synopses, including The Future of Identity & Online Privacy, World Interrupted: The Cyber...
|
|
Retailers can use the European Union’s General Data Protection Regulation as a template to begin planning their organization’s incident response communication plan in the...
|
|
The cannabis market is undergoing explosive growth in all directions. Traditional strategic approaches to information security are unlikely to keep up in an era of...
|
|
Nonprofit organizations need to be frugal with their funding, but that doesn’t mean they need to live in blissful ignorance when it comes to cybersecurity. Honeypots can...
|
|
Voting machines are just like any other machine – susceptible to cyberattacks and vulnerabilities. But how easily can this be done? And how can governments start...
|
|
Recent nation-state attacks and proof-of-concept malware against industrial control systems demonstrate that ransomware is an emerging threat to the energy sector....
|
|
This PowerPoint deck summarizes the recently publicized OpenPGP and S/MIME vulnerability known as EFAIL and recommends actions that users can take to boost security.
|
|
Technologies like IoT have risen in popularity greatly over the last few years. The automotive industry is now faced with the opportunity to incorporate these...
|
|
While all industries are at risk of being targeted by threat actors of any kind, the chemical sector is at an increased risk due to the sensitive information they store...
|
|
Telecoms are an attractive target to attackers – whether they know it or not. Board members can be a critical ally to the organization in getting cybersecurity strategies...
|
|