How businesses can protect their brands and bottom lines against damage from illegal robocalls

March 17, 2021 was a milestone in the war on illegal robocalls. The FCC levied a $225 million fine — the largest in its history — on a telemarketer for making 1 billion illegal robocalls. On the same day, the FCC launched its Robocall Response Team, wh… Continue reading How businesses can protect their brands and bottom lines against damage from illegal robocalls

Identity crime victims struggling with financial, emotional and physical impacts

Nearly 30 percent of people who contact the ITRC are victims of more than one identity crime. Their latest study covers the 36 months from 2018-2020 and goes beyond the known financial implications of identity crimes and explores the emotional, physica… Continue reading Identity crime victims struggling with financial, emotional and physical impacts

The state of enterprise preparedness for ransomware attacks

In the aftermath of the Colonial Pipeline attack, ISACA polled more than 1,200 members in the United States and found that 84 percent of respondents believe ransomware attacks will become more prevalent in the second half of 2021. The Colonial Pipeline… Continue reading The state of enterprise preparedness for ransomware attacks

Enterprise networks vulnerable to 20-year-old exploits

Popular preconceptions of enterprise security and network usage are often inaccurate, according to Cato Networks. While exotic attacks and nation-states such as Russia and China grab headlines, the most prevalent enterprise cybersecurity risks in Q1 ca… Continue reading Enterprise networks vulnerable to 20-year-old exploits

Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

Wednesday June 30, 2021 11 AM PST / 2 PM EST NERC has recently partnered with the Department of Energy (DOE) to expand the Cybersecurity Risk Information Sharing Program (CRISP) to include operational technology. The program is aimed at protecting the … Continue reading Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

How do we decide whether or not to trust AI systems?

Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make song recommendations that improve based on your interactions. However, AI al… Continue reading How do we decide whether or not to trust AI systems?

A leadership guide for mitigating security risks with low code platforms

The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The lingering question of application code security follows, as stories of securit… Continue reading A leadership guide for mitigating security risks with low code platforms

Victims lose millions to healthcare related eCrime

Victim losses from healthcare related eCrime in the U.S. rose by 2,473 percent during 2020 as the COVID-19 pandemic swept through the nation and world, CrowdStrike reveals.   Healthcare eCrime describes a scheme attempting to defraud private or governm… Continue reading Victims lose millions to healthcare related eCrime

Can zero trust kill our need to talk about locations?

As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise vs cloud infrastructure, or access management for branch offices vs remote wo… Continue reading Can zero trust kill our need to talk about locations?