For years, security analysts and researchers warned about fraudsters’ increasing use of SIM-swapping techniques to target smartphones and other mobile devices, with the aim of compromising and taking over custo…
Ever since EU lawmakers enacted the block’s groundbreaking General Data Protection Regulation (GDPR) framework in May 2018, data privacy laws have sparked conversations among IT and security professionals (as w…
With 2022 only a few weeks underway, part of the world’s attention is now focused on Ukraine, where numerous published reports indicate that thousands of Russian troops have gathered at that country’s border fo…
Over the past several months, a notorious Russian-linked group believed responsible for the SolarWinds attack in 2020 has unleashed a new series of cyber-operations. These latest attacks are thrusting supply-ch…
How Ford’s Technical Specialists Manage a Globalized Workforce The automotive industry is in a state of rapid change. In addition to the expedient move to electrification, auto manufacturers around the world ar…
Nearly six months after President Joe Biden signed a far-reaching executive order designed to revamp how the U.S. government approaches cybersecurity and crafts defenses against attacks, some aspects of this se…
Data privacy skills are in high demand, offering opportunities for technologists and compliance professionals to gain new abilities that are critical in today's evolving regulatory environment. Businesses are t…
One of the biggest risks organizations face is lack of security awareness from their own employees. According to Ponemon Institute’s 2020 Cost of Insider Threats Global Report, the cost of insider threats conti…
With employees likely to remain remote for the first half of 2021 (and likely beyond that in many cases), cybercriminals and fraudsters have already adjusted their tactics and techniques to launch fresh waves o…
If the idea of “ethical data management” sounds academic, and even dull, ask yourself this: Would it bother you to learn that healthcare providers share your medical records with outside organizations, whether…
Trust is the cornerstone of the modern web. Sysadmins and developers have always known that their visitors and customers won’t do business with suspicious apps and websites, and near-constant news of high-profi…
We’re all familiar with the so-called Work-Life Balance. But, this conjures up visions of see-saws that must be perfectly balanced with equal weights on both ends at all times to ensure success. I personally be…