Joomla, a free and open-source content management system for publishing web content, developed by Open Source Matters, Inc., has disclosed a data breach which affects 2,700 individuals.
Lookout, Inc. released its 2020 Mobile Phishing Spotlight Report that reveals there was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020.
Led by Noam Rotem and Ran Locar, vpnMentor’s research team discovered a massive amount of incredibly sensitive financial data connected to India’s mobile payment app Bharat Interface for Money (BHIM) that was exposed to the public.
vpnMentor's research team, led by Noam Rotem and Ran Locar, discovered a data breach belonging to the Spanish e-learning platform 8Belts, affecting 150,000s of people across the globe.
U.S. Senators Ben Cardin (D-Md.), Jim Risch (R-Idaho) and Chris Murphy (D-Conn.) introduced the Global Health Security and Diplomacy Act (GHSDA) to better detect, deter, and contain infectious disease outbreaks overseas before they become global pandemics.
The Cybersecurity and Infrastructure Security Agency (CISA) released the first in a series of six Cyber Essentials Toolkits - a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks.
The best UES solution is one that buttresses its capabilities by simplifying administration, increasing visibility and control, reducing costs and eliminating unnecesary friction all while providing a higher value of security, productivity and user experience.
There's a special place for people whose jobs don't require tremendous sacrifices but insert themselves into the fray. Many of them are security professionals.
COVID-19 may mean the end of the open office plan, in-person conferences and handshakes. How has cybersecurity changed, and what new role will CISOs play?
With the sudden shift to work-from-home operations, CISOs and security teams have an important role in strengthening business continuity by ensuring that current and future remote cybersecurity work policies do not create tradeoffs between usability and security. What are three steps to address this issue?