Data Privacy & Cybersecurity
Federal law enforcement agencies are cracking down on perpetrators of business email compromise scams, also known as BEC scams. Learn more about the latest developments.
Lawmakers and witnesses criticized the complicated patchwork of cybersecurity regulation that hinders the private sector’s ability to fight threats.
Delve into the key principles, benefits, and challenges of information governance (IG) and learn what it takes to develop a successful IG program.
In 2022 the FTC sanctioned companies for lax cybersecurity in two cases. Will UnitedHealth face a similar response?
Read how these changes in cybersecurity will affect security practices for government contractors, cybersecurity vendors, and software solution providers.
Discover why manufacturing’s low tolerance for downtime creates made-to-order leverage for extortion, causing it to be the most attacked by cybercriminals.
A post on a hacking forum identified the Santander Bank perpetrators as ShinyHunters, the same group that recently stole data from AT&T and Ticketmaster.
The hackers gained control by planting a file in an update so the corrupted courtroom recording software transmits system data back to the threat actors.
The Christie’s data breach forced the auction house to shut down its website just days before its marquee sale in New York.
Explore these recent under the radar cyberattacks that may not have been reported on but still offer plenty of cybersecurity takeaways.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.