Home Tags Security

Tag: Security

Microsoft 365 Zero Trust deployment plan

Check out their plan here.

Breaking: ISO publishes new Information Governance (IG) standard

ISO 24143 Information and documentation — Information Governance — Concept and principles Introduction Information is a critical asset that is indispensable to support business processes and...

U.S. DoD tricked into paying $23.5 million to phishing actor via...

The U.S. Department of Justice (DoJ) has announced the conviction of Sercan Oyuntur, 40, resident of California, for multiple counts relating to a phishing operation that caused $23.5 million in damages to the U.S. Department of Defense (DoD).

ARMA releases Information Governance Implementation Model v2.0

The ARMA Information Governance Implementation Model is a useful tool to connect the various stakeholders of information governance. From risk mitigation through to value...

Widely used UPS devices can be hijacked and destroyed remotely via...

Check out the post here. “UPS devices, like many other digital infrastructure appliances, are often installed and forgotten. Since these devices are connected to the...

Two Arrested for Alleged Conspiracy to Launder $4.5 Billion in Stolen...

Government Seized $3.6 Billion in Stolen Cryptocurrency Directly Linked to 2016 Hack of Virtual Currency Exchange

Webinar: IS IT TOO COLD FOR PHISHING? on February...

Thurs, February 24, 202211:30 AM - 1:00 PM ET Northern Virginia has faced some cold weather along with a surge in COVID, but that's not...

Webinar: The Supply Chain Security Gap: Impacts on Connected and Embedded...

REGISTER HERE FEATURED PRESENTERS Dr. Larry PonemonChairman and Founder, Ponemon InstituteDr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute and is considered a...

E-Waste Is a Cybersecurity Problem, Too via IEEE Spectrum

Toxic chemicals can leach out of old devices—but so can sensitive data

Morgan Stanley to Pay $60 Million to Settle Data-Breach Suit via...

Check out the article here.

Cyber Alert: Apache Releases Log4j Version 2.15.0 to Address Critical RCE...

OCR is sharing the following guidance from the Cybersecurity and Infrastructure Security Agency (CISA) about a new remote code execution vulnerability requiring immediate attention....

Personal details of up to 80,000 SA government employees accessed in...

Check out the article here.