Heath Anderson, Director of Information Security and Technology at LogicGate, discusses how to build business and operational resiliency with a governance, risk management and compliance (GRC) program.
Does traditional security information and event management (SIEM) still offer the robust protection it did back in the ’00s? Despite its reputation as a data security essential, traditional SIEM dashboards are leaving companies across the globe unknowingly vulnerable.
Every organization must prepare for a ransomware attack. The question is how best to do it. Surprisingly, we can turn to an unlikely source for advice on avoiding a ransomware attack – the criminals themselves.
In this piece, we look at what the Protect Duty law in the U.K. will look like, how it might impact legal requirements in other countries, and how security professionals in the U.S. and beyond can use the findings of the inquiry to fulfill their ethical responsibility to keep visitors and staff as safe as possible.
According to a watchdog report, U.S. Census Bureau computer servers were exploited in January 2020 during a cybersecurity attack, but hackers’ attempts to keep access to the system were unsuccessful.
BlackBerry publicly disclosed that its QNX Real Time Operating System (RTOS) is affected by a BadAlloc vulnerability—CVE-2021-22156, with a CVSS score of 9. BadAlloc is a collection of 25 vulnerabilities affecting multiple RTOSs and supporting libraries of critical infrastructure organizations and other organizations developing, maintaining, supporting, or using affected QNX-based systems.