Cybersecurity
Expert insights into protecting data, software programs, systems and networks from ever-increasing digital attacks.
MORE CYBERSECURITY ARTICLES
Businesses Continue to Embrace AI for Hiring, Customer Service & Cybersecurity
About six months from the splashy launch of Open AI’s ChatGPT and despite continued global regulatory concerns about AI’s proliferation,...
Electric Vehicle Charging Stations: Unexpected Target for Cyber Attacks?
By 2030, electric vehicles are expected to account for about 40% of all car sales in the U.S. While that’s...
Social Selling Creates SEC Compliance, Security Demands for Financial Advisers
Social selling gives financial advisers an effective way to connect with potential clients and build a rapport with them as...
SEC Proposes Slate of New Cybersecurity Regulations. Is Your Firm Ready?
The SEC is continuing its focus on cybersecurity regulations by announcing three new proposed rules and re-opening the comment period...
Are You Wearing Rose-Colored Glasses — or Blinders? How Executives’ Views on Cyber Risk Can Affect Compliance
Changes to digital spaces in recent years have led to a sharp rise in IT risk for many organizations. With...
Risk Ledger Analysis: Expect More Supply Chain Cyber Attacks
A third-party supply chain cyber attack against computer chip giant Applied Materials, expected to result in losses of $250 million,...
Building a Defense-in-Depth Culture to Combat Phishing
Phishing attempts are only growing more sophisticated by the day, and effective cybersecurity means defending all the vectors of attack,...
Cloud Security Isn’t Just on Your Provider; It’s Your Job, Too
Organizations want to embrace all the benefits the cloud has to offer while still protecting their sensitive data. Engaging a...
Sobering Reality: Drizly Order Indicates Officers May Face Personal Liability for Data Breaches
The FTC says Drizly’s CEO James Cory Rellas was alerted to a potential security loophole two years before a data...
How to Turn Security and Compliance From a Tug of War Into the Dream Team
Perhaps once distinct teams within organizations, security and compliance functions today go hand-in-hand — or at least they should, writes...
Not Your Grandpa’s C-Suite: Improving Tech Fluency at the Top of the Organization
In our hyper-connected world, just about every company is a tech company. As commerce and technology become increasingly intertwined, it’s...
What Can Your Organization Learn From the New CISA Strategic Plan?
Cyber threats against organizations of all sizes are only rising as scammers and fraudsters become more and more sophisticated. Kyung...