Understanding Global IoT Security Regulations

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% over the 2020-2024 forecast period. It offers promising benefits that are rapidly transforming a variety of industries, i… Continue reading Understanding Global IoT Security Regulations

Data Clean Rooms for Innovation and Collaboration

Data, being a key enabler for innovation, growth, development and revenue, is the currency of the 21st century and an organization’s most valuable asset. Unlike a tangible asset, the value an organization can seek from data is endless; essentially, th… Continue reading Data Clean Rooms for Innovation and Collaboration

EU, U.S. Partner on Malware, Cybersecurity Defense

Last week, the world’s major democratic governments took steps to coordinate cybersecurity defenses, with the European Union and the United States launching an initiative to combat ransomware, which has become an increasingly critical national securit… Continue reading EU, U.S. Partner on Malware, Cybersecurity Defense

After Van Buren, are Data Scraping Cases Barred?

The federal computer crime law makes it both a criminal offense and a civil offense (you can sue for damages or loss) for someone to “access a computer without authorization” or to “exceed authorized access” to a computer, and then do certain proscrib… Continue reading After Van Buren, are Data Scraping Cases Barred?

In Memoriam: John McAfee, 1945–2021. R.I.P.

John David McAfee took his own life yesterday, in a Spanish prison.
The post In Memoriam: John McAfee, 1945–2021. R.I.P. appeared first on Security Boulevard.
Continue reading In Memoriam: John McAfee, 1945–2021. R.I.P.

Ransomware and the Tax Code’s Perverse Incentive

Ransomware payments are deductible, say tax experts: That’s the shocking finding from a recent investigation.
The post Ransomware and the Tax Code’s Perverse Incentive appeared first on Security Boulevard.
Continue reading Ransomware and the Tax Code’s Perverse Incentive

Hi-5 With A CISO Piotr Stecz, Adamed Pharma

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Piotr Stecz has been working in Adamed Pharma for 18 years in various IT and Security roles. 4 years ago he was appointed as the Chief Info… Continue reading Hi-5 With A CISO Piotr Stecz, Adamed Pharma

SOC 2 Admin and Control Owner Responsibilities — and Tips for Passing an Audit

SOC 2 compliance is a heavy lift for compliance managers and IT admins — delegate controls responsibly and avoid stretching your team members too thin.
The post SOC 2 Admin and Control Owner Responsibilities — and Tips for Passing an Audit appeared fir… Continue reading SOC 2 Admin and Control Owner Responsibilities — and Tips for Passing an Audit

Cops Cop Cl0p Ransomware Gang (or Maybe Not?)

The National Police of Ukraine is crowing about arresting eight alleged ransomware scrotes from the Clop gang.
The post Cops Cop Cl0p Ransomware Gang (or Maybe Not?) appeared first on Security Boulevard.
Continue reading Cops Cop Cl0p Ransomware Gang (or Maybe Not?)

The Business Value of the Social-Engineer Phishing Service

Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations.  Additionally, they are developing techniques to use an…
The post The Business Value of t… Continue reading The Business Value of the Social-Engineer Phishing Service