Data theft is inarguably big business for hackers. This has been proven time and time again when big-name companies and their customers are involved in a data breach. As these instances appear to take place more often, and the number of stolen or compromised files continues to rise, it’s worth looking into exactly what hackers…
With the rise in cyberattacks at the forefront of the news on a near daily basis, it’s becoming increasingly clear that the role of risk management and security must be elevated throughout the financial services and banking markets. Physical and IT security leaders are shifting toward a more proactive approach to security than in years’…
The U.S. sanctioned five Russian entities and three individuals Monday, accusing them of malicious cyber activities to provide material and technological support to Moscow’s intelligence service. Treasury Secretary Steven Mnuchin said the sanctioned entities and individuals “have directly contributed to improving Russia’s cyber and…
The manual is confusing, to be fair, but a third of users read it wrong and are dangling data If you’re sysadmin of an organisation using Google Groups and G Suite, you need to revisit your configuration to make sure you aren’t leaking internal information. That advice comes from Kenna Security, which on June 1…