Category: CyberSecurity-Insiders

China asks Apple to bolster its data security and privacy protections
28
Mar
2023

China asks Apple to bolster its data security and privacy protections

China has urged Apple CEO Tim Cook to bolster its products’ data security and privacy protections. While, most people in…

OPINION: Why Perfection is the Enemy of Progress in Cybersecurity
28
Mar
2023

OPINION: Why Perfection is the Enemy of Progress in Cybersecurity

Is your organization suffering from cybersecurity paralysis? Many businesses are in cybersecurity panic-mode due to the steady stream of alarming…

Dridex malware, the banking trojan
28
Mar
2023

Dridex malware, the banking trojan

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Cybersecurity Industry News Review - March 28, 2023
28
Mar
2023

Cybersecurity Industry News Review – March 28, 2023

[ This article was originally published here ] By Joe Fay The U.K. writes a cybersecurity prescription for the NHS…

How to Comply with the U.S. Federal Trade Commission's (FTC) revised Safeguards Rule
28
Mar
2023

How to Comply with the U.S. Federal Trade Commission’s (FTC) revised Safeguards Rule

If you handle consumer financial data, you need to be aware of the U.S. Federal Trade Commission‘s (FTC) revised Safeguards Rule cybersecurity regulation….

Romance scams loss termed to have reached £10k on an average in UK
28
Mar
2023

Romance scams loss termed to have reached £10k on an average in UK

A report compiled by Barclays states that the amount of money lost in romance scams has reached an average of…

Source Code of Twitter leaked on GitHub
27
Mar
2023

Source Code of Twitter leaked on GitHub

Twitter issued a public statement stating that parts of its source code were leaked on GitHub and that its officials…

Women in Cybersecurity – History to Today
27
Mar
2023

Women in Cybersecurity – History to Today

[ This article was originally published here ] This March, Women’s History Month, we shared and her trailblazing innovations in…

How often should security audits be?
27
Mar
2023

How often should security audits be?

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

ChatGPT users data leaked because of bug vulnerability
27
Mar
2023

ChatGPT users data leaked because of bug vulnerability

OpenAI-developed ChatGPT has hit the news headlines because user information has been leaked on the web by some threat actors…

Artificial Intelligence vs Machine Learning: Understanding the Differences
27
Mar
2023

Artificial Intelligence vs Machine Learning: Understanding the Differences

Artificial intelligence (AI) and machine learning (ML) are two terms that are often used interchangeably, but they are not the…

New Report on Current and Emerging Cyber Threats to Healthcare
25
Mar
2023

New Report on Current and Emerging Cyber Threats to Healthcare

Health-ISAC, a nonprofit, private sector, member-driven organization, has released its annual cyber threat report on current and emerging threat activity…