A California-based consumer-advocacy group is putting it in starker terms, suggesting a mass cyberattack against such vehicles could lead to Sept. 11-level casualties.
The Washoe County School District (WCSD) in Nevada announces a data breach, involving 114,000 students enrolled at WCSD between 2001 and 2016, and "a much smaller number of staff members employed during the same period", says a WCSD press release.
As companies digitize businesses and automate operations, cyber risks proliferate; here is how the cybersecurity organization can support a secure digital agenda.
Two consistent and related themes in enterprise technology have emerged in recent years, both involving rapid and dramatic change. One is the rise of the digital enterprise across sectors and internationally. The second is the need for IT to react quickly and aggressively develop innovations to meet the enterprise’s digital aspirations.
Today, technology is evolving at a faster rate than ever before. As a result of the rapid rate of change, we are creating an ever-increasing amount of data.
On a recent trip to Australia, I appeared on a National morning news show. It wasn’t long until the hosts were trying to get me to weigh in on a debate that was then raging in their legislature.
End-to-end encryption provides a foundational data protection safeguard, allowing secure data transfer between the sender and recipient while blocking it from external compromise. It also means this data can be inaccessible to law enforcement, who then must find alternative means to access that data.
ASIS International announced the recipients of its 2019 Innovative Product Awards (IPA) for Global Security Exchange (GSX) 2019, to be held September 8-12 in Chicago.
The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft.
Seven in 10 senior financial executives at the world’s largest companies believe their insurer would cover most or all of the losses their company would incur in a cyber attack. Many of the losses they foresee, however, are rarely covered by insurance.