The coronavirus pandemic has triggered an unprecedented chain reaction of border closures around the world. This truly is an extraordinary situation, and many countries have also grappled with lack of information, resources and coordination between relevant agents and authorities. These operational issues have raised questions globally about whether border controls are effective in containing such outbreaks, how prepared border agencies were for the emergency and what this will mean for border management in a post-pandemic world.
According to the latest white paper from Keeper Security, "Understanding & Preventing Ransomware Attacks," ransomware attacks have become increasingly common for three reasons.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) and the Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC) have signed a memorandum of understanding (MOU) to share cyber threat information that will enable stronger protection for both sectors.
If you've done your job correctly, you will never ask "now what?" when a cyberattack occurs, because you'll already have an incident response plan in place that prescribes exactly what you need to do.
United Kingdom security researchers say it took SonicWall more than two weeks to patch a vulnerability in 1.9 million SonicWall user groups, affecting some 10 million managed devices and 500,000 organizations.
Faith-based institutions need to be welcoming and inclusive with their duty of care to provide a safe space for worship, even with constraints on safety and security budgets in a non-profit environment.
With COVID-19 still an ever-present threat, many essential businesses have learned important lessons about business resiliency, maintaining operations, and mitigating the unique risks and considerations that a pandemic such as this brings to the forefront.
The Australian Government has released The Code of Practice: Securing the Internet of Things for Consumers (Code of Practice). The guide represents a first step in the Australian Government’s approach to improve the security of IoT devices in Australia.
The nonprofit association of certified cybersecurity professionals has published "The Enterprise Guide to Establishing a Cybersecurity Training Program," designed to help companies create cybersecurity training plans.