Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Intelligence-Led Response: Navigating Cybercrime Threats & Extortion Demands

Discover the power of intelligence-led approaches in dealing with cybercrime threats. Learn how to assess extortion demands and distinguish real threats. Join us to master the art of response through insightful intelligence assessments. GUEST BIOS Joe Hancock.

What is the Texas Data Privacy and Security Act (TDPSA)?

The Texas Data Privacy and Security Act (TDPSA) was enacted on June 18, 2023, making Texas the tenth U.S. state to authorize a comprehensive privacy law that protects resident consumers. The TDPSA borrows many statutes from other state privacy laws, mainly the Virginia Consumer Data Protection Act (VCDPA) and the California Consumer Privacy Act (CCPA).

6 cybersecurity challenges for state and local governments

Today’s state and local governments are facing a deluge of increasingly sophisticated cybersecurity threats. As custodians of vast amounts of sensitive information on their citizens, these institutions are high-value targets for threat actors. The ongoing digitization of government functions combined with the growing prevalence of advanced cyberattacks has significantly escalated the level of risk these organizations must manage.

How To Buy and Sell Safely on Facebook Marketplace

To buy and sell safely on Facebook Marketplace, you should check seller and buyer profiles, meet in a public place when selling or purchasing an item, have a friend or relative accompany you for the exchange of goods, use secure payment methods and more. Continue reading to learn more about Facebook Marketplace scams and how to stay safe from them when selling or buying on the platform.

The Rise of CI0p Ransomware with MOVEit Transfer Vulnerabilities

In today’s interconnected world, the reliance on secure file transfer software is paramount for businesses dealing with sensitive data. Among these tools, MOVEit Transfer software has been a popular choice worldwide, especially in the US, to ensure secure file transfers. However, recent events have exposed its vulnerabilities, leading to the active exploitation by the CI0p ransomware group.

Five Ways to Secure External Identities

If you stick with any movie through the end credits, you’ll see – not just the household names who act and direct – but the full scope of players who make a film happen. The scroll can seem endless: writers, CGI designers, location scouts… animal handlers and the illustrious “best boy grip.” It’s a wide-ranging ecosystem where everyone plays a role.

Strange Bedfellows: Software, Security and the Law

The ongoing rise in cyberattacks across the software supply chain and a shifting regulatory landscape are forging an unlikely alliance between CISOs, software leaders and legal experts. Privacy, the shifting and diverse regulatory landscape, liability and new AI/ML use cases all present unique challenges and opportunities for risk management, but to best navigate these challenges, legal teams must be involved, too. Why? Because today, software vulnerabilities can represent not just a business risk but a legal risk.