Data Privacy & Cybersecurity

Notable Data Breaches and How To Protect Your Company

Notable Data Breaches and How To Protect Your Company

Causes and impacts of data breaches at companies large and small, and what you can do to avoid them.

Microsoft Cybersecurity Errors Led To Breach Of Companies’ Data

Microsoft Cybersecurity Errors Led To Breach Of Companies’ Data

The US Cyber Safety Review Board has been critical of Microsoft cybersecurity errors that allowed a Chinese nation-state group to breach more than 20 companies.

Are Ransom Attacks State-Sponsored Terrorism?

Are Ransom Attacks State-Sponsored Terrorism?

The State Department has offered up to $15 million for information on two Russia-based ransomware gangs. Are ransom attacks state-sponsored terrorism?

Weaponizing AI in Cyberattacks Discussed on Hacker Forums

Weaponizing AI in Cyberattacks Discussed on Hacker Forums

Security researchers have found dedicated AI and machine learning for criminal uses of popular chatbots.

AT&T Data Breach Confirmed

AT&T Data Breach Confirmed

Read more about a news release that confirmed an AT&T data breach exposing 73 million current and former customers to a dark web marketplace for fraudsters.

Safeguarding Your Products: Compliance with IoT Cybersecurity Regulations

Safeguarding Your Products: Compliance with IoT Cybersecurity Regulations

Stay ahead of the curve on compliance with IoT cybersecurity regulations with expert guidance for meeting industry standards and protecting consumer trust.

The Three C’s: Collaboration Between Cybersecurity and Compliance

The Three C’s: Collaboration Between Cybersecurity and Compliance

Explore how these critical functions converge to fortify organizational resilience against emerging threats and regulatory scrutiny.

Backups Are the Only Defense Against Ransomware

Backups Are the Only Defense Against Ransomware

Recent takedowns of LockBit and other cybercrime groups have prompted speculation that defense against ransomware attacks might be possible. Learn why this isn’t the case as long as Russia protects cybercriminals.

MFA Fatigue Attacks Targeting iCloud Users

MFA Fatigue Attacks Targeting iCloud Users

This new phishing technique hits the victim with repeated multi-factor authentication requests, causing the operator to robotically click Yes/Allow, giving the attackers access.

Thousands Of Companies Face AI Infrastructure Vulnerability

Thousands Of Companies Face AI Infrastructure Vulnerability

Discover how hackers are exploiting a disputed vulnerability in a popular open-source AI framework known as Ray.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top