Compliance in the age of technology – Legal Futures
Does keeping up with best practice for your law firm in compliance, finance and risk management keep you awake at night? If so, you are not alone. The post Compliance…
Does keeping up with best practice for your law firm in compliance, finance and risk management keep you awake at night? If so, you are not alone. The post Compliance…
Consumers are victims of online scams and have their data stolen, but they are lagging on adopting security tools to protect themselves. – Read More
Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged…
Attorneys for Joseph Sullivan argue the jury didn’t hear essential facts of the case during the original trial and that his conviction must be overturned. – Read More
Threat actors are actively exploiting two of the vulnerabilities, while three others are publicly known and ripe for attack. – Read More
IT-Systeme sicher – OT egal? Gorodenkoff – shutterstock.com Einige Sicherheitsentscheider sind davon überzeugt, Risiken im Bereich Operational Technology (OT) nicht bewerten oder standardisieren zu müssen, weil sie sie nicht betreiben.…
Forscher decken Sicherheitslücken in Webanwendungen auf. Zugangsschlüssel u.ä. wurden gestohlen. Photo For Everything – shutterstock.com Amazon Web Services (AWS) wurde Ziel einer Cyberattacke. Im Zuge der Attacke sammelten die Aggressoren…
Sales Pitch oder Event mit echtem Mehrwert? Die Grenzen verschwimmen zusehends. Matej Kastelic | shutterstock.com Als Chief Information Security Officer (CISO) habe ich den Wandel der Cybersicherheit von einer IT-Nischenfunktion…
Universitätsklinikum Frankfurt Zehn Monate nach einem Hackerangriff sind die Stationen und Mitarbeiter der Uniklinik Frankfurt nun wieder vollständig digital über Website und E-Mail-Adressen erreichbar. Anstelle der bisherigen Adresse kgu.de läuft…
Häufig ist der Microsoft Authenticator die schnellste Wahl. Aber ist es auch die richtige? Ascannio – shutterstock.com Microsofts Authenticator-App hat ein Alleinstellungsmerkmal: Das Tool löscht alte Konten, wenn neue Konten…
Our updated multi-factor authentication (MFA) guidance recommends organisations use techniques that give better protection against phishing attacks. – Read More
Aryaka continues to build out its SASE platform, adding new capabilities aimed at enhancing security and simplifying the adoption process for enterprises that want to consolidate their network and security…
As healthcare organizations struggle against operational issues, two-thirds of the industry suffered ransomware attacks in the past year, and an increasing number are caving to extortion and paying up. –…
Key Takeaways: Standardized DPAs allow you to streamline their operational processes, as there’s no need to adjust systems and procedures to meet the differing requirements of customized DPAs. Monitoring and…
The annual event reinforces best practices while finding new ways to build a culture where employees understand how their daily decisions affect company security. Find out how AWS, IBM, Intuit,…