Trending Now
Editor's Pick
Adobe Offers CCF – an Open Source InfoSec Standard
The Common Control Framework (CCF) by Adobe is the cornerstone of our company-wide compliance strategy....
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities...
BeyondTrust Cybersecurity Predictions for 2020 & Beyond
2020 Prediction Contributors: Morey Haber, CTO/CISO at BeyondTrust and Christopher Hills, Sr. Solutions Architect, Office...
Latest News
Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?
A brief interview summary from the Digital Transformation EXPO Europe 2019 London, England – There’s a tremendous amount of buzz surrounding A.I. these days. Some...
TrueDialog database leaked online tens of millions of SMS text messages
Millions of SMS messages have been leaked by a database run by TrueDialog, a business SMS provider for businesses and higher education providers. Security experts...
TTEC – On The Cusp of Receiving the Federal “Seal of...
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that....
Hacker House exposes major security flaw in US election voting machines
DEMOCRACY IS NOT A GAME ...Unless you're placing your vote on a popular electronic voting machine - one used in at least 16 US States during local...
RSA Conference Announces Initial 2020 Keynote Speakers
Bedford, MA - Dec 03, 2019 More Details on Additional Speakers and Session Content Coming Soon RSA Conference, the world’s leading information security conferences and expositions,...
RevengeHotels campaign – crooks target the hospitality industry
RevengeHotels campaign - The hospitality industry continues to be a privileged target for cybercriminals that target hotels, restaurant chains, and tourism services. Security experts at...
Facebook and Twitter warn of malicious SDK harvesting personal data from...
Some third-party apps quietly scraped personal information from people's accounts from Twitter and Facebook, the social media companies claim. Facebook and Twitter revealed that some...
3-D Secure: The Legacy Protocol Making a Comeback to Secure Online...
By Jennifer Singh Consumers today are spoiled for choice – which clothes to wear, gadgets to buy and payment networks to use to acquire these...