The new cybersecurity law enables the Chinese government to take measures to “monitor, defend and handle cybersecurity risks and threats originating from within the country or overseas sources, protecting key information infrastructure from attack, intrusion, disturbance and damage.”
An operation targeting cybercrime across Asia has resulted in the identification of nearly 9,000 Command and Control servers and hundreds of compromised websites, including government portals.
Security researchers have recorded more than 45,000 cases of ransomware in the past 10 hours alone, most of which are taking advantage of a Microsoft vulnerability.
U.S. President Donald Trump signed an executive order today to bolster the government’s cybersecurity and protect critical infrastructure from cyberattacks.
If at first you don’t succeed, try, try again.” Although catchy, we all know that the real keys to success after failure are reflection and adaptation, not mere persistence.
ASIS and the Information Systems Security Association (ISSA), a global organization of information security professionals and practitioners, have signed an event partnership that will see ISSA fully integrated into the ASIS Annual Seminar and Exhibits (ASIS 2017) taking place 25-28 September in Dallas.
It might be a more exciting story to claim a nation-state pilfered your data, but the more likely scenario is that your enterprise failed at some of the most basic tenets of cybersecurity hygiene, leaving the door open to script kiddies and opportunitistic hackers to run rampant in your system. Join us as we debunk 5 major data breach myths.
While the shortage of cybersecurity staff continues, many enterprises are now looking for less volume and for more specialization.Companies need specialists who are well-versed in the threats aimed at the business's environment.
To select the most comprehensive yet affordable cyber insurance plan for your business, it’s critical to first identify who is accessing your confidential data and how they’re accessing it, as this information will largely dictate how your cyber insurance policy is outlined. Ensure your effective policy includes these six key components.