Search results
Mitigating Vendor Risks to Safeguard Client Confidentiality | Law.com
Law.com· 6 hours agoWhen a global law firm pays millions to settle class action suits from clients whose personal...
Council Post: Enhancing Organizational Security In The Wake Of Regulation Amendments
Forbes· 21 hours agoOn May 15, 2024—exactly one year after the proposed changes—the Securities and Exchange Commission...
Asset Management Holds the Key to Enterprise Defense
Dark Reading· 5 days agoSecurity professionals know that they need to be aware of the assets within their environments if they are to keep their organizations secure. After all,...
University of Arizona gets $1M from Google for new cybersecurity clinic
Arizona Daily Star· 4 days ago“This clinic will be instrumental in advancing our community’s understanding of cyber threats and...
Microsoft Dismissed Warning About Flaw Later Exploited During SolarWinds Attacks: Report
CRN· 4 days agoAccording to a ProPublica report, the tech giant was dismissive of an employee’s warnings about a ...
Microsoft delivers 51 fixes for June Patch Tuesday | TechTarget
SearchSecurity.com· 6 days agoThe company reported no zero-days and just one publicly disclosed vulnerability in June Patch Tuesday's batch of security updates.
Council Post: Can AI Assist Hospital Security Staff With Homeland Security Compliance?
Forbes· 21 hours agoChris Ciabarra is the CTO of Athena Security. Take the tragic case at Legacy Good Samaritan Medical...
Businesses' cloud security fails are 'concerning' - as AI threats accelerate
ZDNet· 6 days agoAsked how they were monitoring risk across their cloud infrastructure, 47.7% of businesses pointed...
SAFETY Act Part II: Levels of Protection
The National Law Review· 6 days agoPart I of this series, SAFETY Act is Powerful Protection Against Emerging Liabilities, addressed the benefits of obtaining SAFETY Act coverage,...
Microsoft Ignored Whistleblower Warnings Before SolarWinds Attack
PC Magazine· 4 days agoWhen Harris explained the vulnerability to other Microsoft staff, they initially argued it was fine because attackers would first have to gain access to a Microsoft server ...