The main purpose of compliance auditing is to identify how well a company is following the rules and policies of various regulatory acts. For example,...
Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight blockchain’s huge potential...
GDPR lessons from the Octoly data leak
Back in 2017, Forever 21, Hyatt Hotels, Uber, and eBay all had their fair share of cybersecurity incidents. And now Octoly, a Paris-based influencer agency, is facing their...
Five worthy reads: Machine learning, the next phase of cybersecurity
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we cover how machine learning...
Free webinar: Everything you need to know about ransomware
2017 saw plenty of ransomware attacks, and cyber security experts believe we’ll see many more this year. Needless to say, enterprises are less than happy with that...
Five worthy reads: Spectre, Meltdown, and chips that ooze data
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we cover the Spectre and...
ManageEngine patches zero-day vulnerabilities
Recently, several zero-day vulnerabilities in ManageEngine products were discovered by Digital Defense, Inc. We thank the company for working with us in the responsible disclosure...
Free webinar: Top five critical alerts you need for IT security
2018 promises to be another big year for IT security, with experts predicting even more large scale cyber attacks over the next 12 months. In light of the...