News

When More is Not Necessarily Better: The Impacts of Multiple Security Tools
CIO

When More is Not Necessarily Better: The Impacts of Multiple Security Tools

Variety may be the spice of life but deploying lots of data protection and backup tools brings several issues professionals must address, according to security experts.
IEEE Transmitter

How Infrastructure + Technology Will Move Us Forward

Long-term resilience and technology-driven advancements will ultimately evolve our infrastructure for the betterment of society and humanity.
The Smart Office Brings New Capabilities and Added Risks
CMSWire

The Smart Office Brings New Capabilities and Added Risks

The rapid development and deployment of workplace technologies, coupled with the adoption of new ways of working, comes with added risks.
Sinclair TV Stations Targeted in Weekend Ransomware Attack
GovInfoSecurity

Sinclair TV Stations Targeted in Weekend Ransomware Attack

Sinclair Broadcast Group, Inc., which owns or operates 186 television stations across 87 U.S. markets, has been hit with a ransomware attack that has disrupted
Protecting schools in hybrid and remote learning environments
Security Magazine

Protecting schools in hybrid and remote learning environments

School budgets have been set for the 2021/2022 school year, policies and procedures have been updated, staffing levels have been established, and security solutions have been deployed into this dynamic environment. Here, we consider adjustments that can be made to deployed controls so that children and school staff remain safe in both hybrid and remote learning environments.
New Legislation Eyes Both Ransom, Incident Reporting
GovInfoSecurity

New Legislation Eyes Both Ransom, Incident Reporting

A bipartisan effort to implement cybersecurity incident reporting and the tracking of ransomware payments has been introduced by leaders of the Senate Homeland
Experts Weigh In on Data-First Modernization
CIO

Experts Weigh In on Data-First Modernization

Although there’s little question that data is well positioned as a corporate asset, most companies haven’t yet figured out how to measure and monetize its value, say experts and influencers. rnrnMost companies recognize the potential for data insights to improve customer experience, better direct marketing strategies, create new products and services, and optimize operations, among myriad compelling use cases. u201cIf you need outsiders to tell you your data is valuable, you’re living in the wrong century,u201d says Wayne Sadin, an independent advisor and former CIO/CTO/CDO. rnrnData is even more valuable during this pandemic period, when economies are volatile, markets are uncertain, and businesses face unprecedented challenges that underscore the need for intelligent insights to guide strategic decision-making. u201cThe pandemic has already accelerated many organizations’ digital transformation programs, and in many cases, data has emerged as an invaluable component of the successes of the modern-day enterprise,u201d notes Sridhar Iyengar, managing director at Zoho. u201cThose businesses which are not already leaning on data insights risk being left behind.u201drn
Remote Work and Cybersecurity: 3 Experts Describe the Tech They Wish Everyone Could Use
IEEE Transmitter

Remote Work and Cybersecurity: 3 Experts Describe the Tech They Wish Everyone Could Use

The pandemic forced organizations to adapt quickly to a distributed workforce, a shift that resulted in unprecedented challenges to business continuity Remote Work, Work from Home, Cybersecurity
Critical Infrastructure Requires Modernization
IEEE Transmitter

Critical Infrastructure Requires Modernization

The May 2021 Colonial Pipeline attack, which resulted in the prolonged closure of one of America’s largest pipelines due to ransomware, highlighted the Critical infrastructure faces the same cybersecurity risks that other businesses face, but the effects are much broader. Here’s what cybersecurity experts are doing to stop them.
Pro-China Operatives Push Protests, Pandemic Conspiracies
GovInfoSecurity

Pro-China Operatives Push Protests, Pandemic Conspiracies

Researchers say a pro-China influence operation leveraging a network of fake social media accounts has expanded, promoting in-person protests and narratives around
Three US state laws are providing safe harbor against breaches
CSHub

Three US state laws are providing safe harbor against breaches

Three US state laws passed between 2018 and 2021 are encouraging organizations not currently following a cyber security control framework to look to update their security programs
A back-to-school plan for reaching the next generation of cybersecurity professionals
Security Magazine

A back-to-school plan for reaching the next generation of cybersecurity professionals

Current cybersecurity professionals and educators can change the narrative, but only if we take individual responsibility to engage with others and be visible members of our communities. Otherwise, the issue of a lack of diversity in the field won’t address itself.
When to have the online-security talk with your kids
Popular Science

When to have the online-security talk with your kids

Knowing between what’s real and what's not online—even for grown-ups. This is why instilling good online habits at an early age is key.
FTC Warns: SMS Phishing Scam Impersonates State Agencies
BankInfoSecurity

FTC Warns: SMS Phishing Scam Impersonates State Agencies

The Federal Trade Commission has issued a warning about a new smishing scheme targeting millions of smartphones nationwide that impersonates state workforce
Telehealth’s Growing Security, Privacy Concerns
HealthcareInfoSecurity

Telehealth’s Growing Security, Privacy Concerns

While the use of telehealth has surged during the COVID-19 pandemic, the data security and privacy concerns for both patients and healthcare providers have also
Where Should Hospitals Direct Their Cybersecurity Focus?
HealthTech Magazine

Where Should Hospitals Direct Their Cybersecurity Focus?

An expert shares advice on what healthcare providers can do now as they continue to navigate security challenges.
6 tips for better collaboration between security and cloud teams
CSO Online

6 tips for better collaboration between security and cloud teams

Good communication, mutual understanding of each team's goals, and proper processes and infrastructure will ensure an effective working relationship between cloud and security teams.
150+ Cloud Thought Leaders & Next Generation Leader: 2023
Whizlabs

150+ Cloud Thought Leaders & Next Generation Leader: 2023

Here is the list of 150+ Top Global Thought Leaders and Next Generation cloud influencers of 2023. Explore our thought leaders!
How healthcare organizations can prepare for a data breach: 7 tips
Becker's Hospital Review

How healthcare organizations can prepare for a data breach: 7 tips

Data breaches are a growing threat for healthcare companies, with more than 350,000 patient records breached in February, Becker's reported. Here, cybersecurity experts give seven tips to prevent and prepare for a data breach.
Dialing #90 or #09 on phone SIM card scam hack fact check
wusa9.com

Dialing #90 or #09 on phone SIM card scam hack fact check

Can you be framed as a criminal if you dial *#90 or #09* while on the phone? Can a hacker take your SIM card by dialing 90 or 9? Fact check scam phone FCC