The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain on alert for malicious cyber activity targeting potential disaster victims and charitable donors following a hurricane.
The Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) was formed as a nonprofit by a group of U.S.-based maritime critical infrastructure stakeholders to promote cybersecurity information sharing throughout the community.
Essam Choudhary, Director of Marketing and Education at RS2 Technologies, has been heavily involved in a number of coronavirus initiatives. Here is his Good Security News!
For the past 20 years, Justin Dolly, new CSO at Sauce Labs, has been leading security at public and private companies. Over the years, how has he built security teams and played a key role in risk management, security engineering and operations and compliance initiatives at the many companies he has serviced?
According to multiple sources, a bipartisan group of Senators plan to introduce a bill to regulate the use of contact-tracing and exposure notification apps. The bill, entitled the “Exposure Notification Privacy Act” is the latest in a series of bills that seek to regulate these new apps. The new bipartisan bill raises hopes that federal privacy legislation (albeit on a limited issue) may finally pass.
How are IT and security professionals across a variety of industries including finance, IT and media managing identity and access management (IAM) programs?
FEMA released the “COVID-19 Pandemic Operational Guidance for the 2020 Hurricane Season” to help emergency managers and public health officials best prepare for disasters, while continuing to respond to and recover from coronavirus (COVID-19).
U.S. Senators Ben Cardin (D-Md.), Jim Risch (R-Idaho) and Chris Murphy (D-Conn.) introduced the Global Health Security and Diplomacy Act (GHSDA) to better detect, deter, and contain infectious disease outbreaks overseas before they become global pandemics.
COVID-19 may mean the end of the open office plan, in-person conferences and handshakes. How has cybersecurity changed, and what new role will CISOs play?
With the sudden shift to work-from-home operations, CISOs and security teams have an important role in strengthening business continuity by ensuring that current and future remote cybersecurity work policies do not create tradeoffs between usability and security. What are three steps to address this issue?
There’s a good chance that at some point you’ve been watched, scanned, or analyzed by facial recognition technology — potentially without even realizing it, says a new study by Surfshark.