Home Search

fines - search results

If you're not happy with the results, please do another search
Uber Data Breach

How Uber’s 2016 Data Breach Took a Wrong Turn

0
Mistakes are inevitable, but intentional acts may result in severe repercussions. Uber’s negligence of hiding a data breach took the taxi-aggregator to multiple wrong...
CISO, Cybersecurity

Top Cybersecurity Rule: Don’t Put Your Business at Risk

0
No company wants to put its business at risk. Indeed, we all strive for success, while continually trying to mitigate risk. The key to...
Patchwork BADNEWS, APT31 threat group

French Organizations on APT31 Group’s Radar

0
Like ransomware attacks, cyber espionage campaigns are fatal and can cause irreparable damage to enterprise IT security perimeter. Government and organizations must enforce robust...
Vulnerabilities in Zimbra

Risk-based Vulnerability Management – Let’s Begin With the “Why?”

0
Any organization’s vulnerability management program must be a cornerstone of its cybersecurity initiative. Security vulnerabilities, if left unidentified and/or unaddressed, can bring the business...

“Until now, technology gave you no protection and confidentiality when you shared your data”

0
There is a critical business challenge when it comes to sharing data between entities, such that any one person or firm should not see...
Brazil cybercrime, Brazilian cybercrime

Brazil Implements Tougher Reforms to Fight Cybercrime

0
Brazil is the top-most targeted country in Latin America when it comes to phishing attacks. As per official stats, one in every five (19.94%)...
Confidential Information

Information Security Governance Guide For the CISO

0
We're not in an information age anymore. We're in the information management age. ~ Chris Hardwick. Information governance is a corporation's core information policy. The...
Ransomware, supply chain and ransomware

10 Legal Questions You Should Be Asking About Ransomware

0
Data extortion through cyber means is an insidious threat that thousands of companies throughout the world experience firsthand. For many bad actors, it is...
third-party risk

Innovate Through Uncertainty by Managing Third-party Risk

0
Like beauty, risk is in the eye of the beholder, and business risk is no exception. While some organizations perceive risk as a potential...
security, tech provider

Integrating Ethics with Technology

0
Tech is not above us. It should be governed by all of us, by our democratic institutions. It should play by the rules of...