Similar Posts
How to Keep Your Business Running in a Contested Environment
When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols, it’s essential for them to establish comprehensive plans for preparation, mitigation, and response to potential threats. At the heart of your business lies your operational technology and critical systems. This places them at the forefront of cybercriminal
Biden’s Artificial Intelligence Executive Order Covers Broad Concerns
The executive order is ambitious and seeks to protect a variety of different groups who are most at risk from the irresponsible use of AI.
Budget Cuts at CISA Could Affect Enterprise Cybersecurity
Politicians are suggesting massive cuts to CISA’s budget, threatening its missions to secure federal networks and help critical infrastructure operators fend off cyberattacks.
Fireside Chat: Creating a Holistic Risk Mitigation Strategy
Kirsten Bay, CEO, Cysurance joins Raja Patel, CPO, Sophos, to discuss how cyber defenses and cyber insurance can work together to lower the total cost of ownership of cyber risk mitigation.
FTC orders non-bank financial firms to report breaches in 30 days
FTC orders non-bank financial firms to report breaches in 30 days The U.S. Federal Trade Commission (FTC) has amended the Safeguards Rules, mandating that all non-banking financial institutions report data breach incidents within 30 days. […] The U.S. Federal Trade Commission (FTC) has amended the Safeguards Rules, mandating that all non-banking financial institutions report data…
Hackers Stole Access Tokens from Okta’s Support Unit
Okta, a company that provides identity tools like multi-factor authentication and single sign-on to thousands of businesses, has suffered a security breach involving a compromise of its customer support unit, KrebsOnSecurity has learned. Okta says the incident affected a “very small number” of customers, however it appears the hackers responsible had access to Okta’s support…