- US senator: Govts spy on Apple, Google users via mobile notifications
- Navy contractor Austal USA confirms cyberattack after data leak
- Atlassian patches critical RCE flaws across multiple products
- Varonis Introduces Athena AI to Transform Data Security and Incident Response
- Nissan is investigating cyberattack and potential data breach
- Hybrid Cloud Cyber Resiliency Insights - GovTech
- Roger Williams University Named A National Center Of Academic Excellence In Cyber Defense By National Security ... - Patch
- 69% of organizations facing ransomware attacks paid the ransom - Security Magazine
- Union Health responds after cybersecurity breach incident - MyWabashValley.com
- HHS' cybersecurity strategy: Financial incentives, sharper teeth - FierceHealthcare
- Ostrich Cyber-Risk Announces Partnership with C-Risk to Strengthen Cybersecurity Resilience and Innovation - Security Boulevard
- Managed Security Services Provider (MSSP) Market News: 6 December 2023 - MSSP Alert
- HHS Announces Next Steps in Ongoing Work to Enhance Cybersecurity for Health Care and Public Health Sectors - HHS.gov
- Serpent Stealer Acquire Browser Passwords and Erases Intrusion Logs - GBHackers
- Locking down the edge - The Register
- Student Loan Breach Exposes 2.5M Records
- Watering Hole Attacks Push ScanBox Keylogger
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
- Ransomware Attacks are on the Rise
- Cybercriminals Are Selling Access to Chinese Surveillance Cameras
- Twitter Whistleblower Complaint: The TL;DR Version
- Firewall Bug Under Active Attack Triggers CISA Warning
- Fake Reservation Links Prey on Weary Travelers
- iPhone Users Urged to Update to Patch 2 Zero-Days
- Google Patches Chrome’s Fifth Zero-Day of the Year
Latest Blog Posts
- Third-Party Cyber Risk is Critical – Part 1
- Will AI change how cyber security is done?
- Best practices for building enterprise-wide cyber risk management
- Uncovering Hidden Threats: A Step-by-Step Guide to Conducting a Cybersecurity Risk Assessment
- Unlocking the Key to Secure Passwords: Improving Management and Protection
Get a 360-degree view of your entire information security/data privacy programs and gain greater insight into which cyber risks are putting your organization in a vulnerable position
Learn More