ICS is Becoming a Hot Favorite of Threat Actors: Kaspersky Report
ICS (Industrial Control System) or SCADA have faced large volumes of attacks from notorious threat actors in the recent past. Be it the China-linked...
DHS to Launch 60-day Cyber Sprints to Prevent Ransomware Attacks
The increasing ransomware attacks have become a severe issue for all nations globally. From the health care sector to information technology, ransomware attacks continue...
Alleged Facebook Data Leak Affects 6 Mn Indian Users
Days after the MobiKwik data breach incident, wherein, 3.5 million MobiKwik users’ KYC details were allegedly leaked, another major data leak event concerning Facebook...
How does HIPAA Compliance help in protecting the PHI data?
For those of you who are involved in the Healthcare Industry must be well aware of the Health Insurance Portability and Accountability Act (HIPAA)...
How Automation Can Protect Against Data Breaches
The digital era is awash with potential threats including malware, spyware, ransomware, and denial of service attacks that threaten the security of workplaces everywhere....
“Build a more robust pipeline for cyber talent”
It has been an age-old myth that women prioritize family over work. Women are under-represented in tech and leadership. According to an (ISC)² Cybersecurity...
Empowering Marginalized Voices in a Digital World
Over a century ago, the U.S. Congress sanctioned the 19th Amendment (Amendment XIX), which prohibits the states and federal governments to discriminate and deny...
Get Cybersecurity Projects Approved by Articulating the Value of the Data
Cybersecurity projects are often balked at because businesses rarely realize the value of their data. For many organizations, data is something that accumulated over...
Malware Intrusion Disrupts Honeywell’s “Limited” IT Systems
On March 23, Honeywell, a well-known U.S.-based industrial tech giant, revealed that it was under a malware attack. The firsthand account states that the...
Companies of All Sizes Now Recognize That They Are Potential Targets
Seth P. Berman leads Nutter’s Privacy and Data Security practice group and is a member of the firm’s White Collar Defense practice group. As...