Mastercard, in collaboration with Microsoft, Workday and the nonprofit, nonpartisan Partnership for Public Service, launched the Cybersecurity Talent Initiative – a public-private partnership to recruit the nation’s best minds to defend against global cyberattacks.
According to the Assessment of Business Cyber Risk (ABC) report by the U.S. Chamber of Commerce and FICO, the level of cyber risk to the U.S. business community is holding steady for the first quarter of 2019, with a national risk score of 687.
A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77 percent of survey respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise.
Two out of three hotel websites inadvertently leak guests' booking details and personal data to third-party sites, including advertisers and analytics companies, according to research by Symantec Corp.
The Defense Industrial Base Sector Coordinating Council (DIB SCC) announced the chartering of the Supply Chain Cybersecurity Industry Task Force to identify, prioritize, oversee and drive adoption of implementable solutions to protect controlled unclassified information throughout the supply chain.
Hackers can access a patient’s 3-D medical scans to add or remove malignant lung cancer, and overwhelmingly deceive both radiologists and artificial intelligence algorithms used to aid diagnosis, according to a new study.
ICS Cyber-Security is the conference where industrial control systems users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Read More
ON DEMAND: All networked systems and devices are exposed to cybersecurity threats. Building security systems are no exception to this rule. Many security systems have been afflicted by ransomware and cyber vulnerabilities. Some have been exploited to create bot armies or to provide an easy entry point for cyber criminals looking to attack valuable corporate assets. Neglect of cyber-hygiene is at the root of many of these issues.
ON DEMAND: This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training. Join this session to tailor your approach to awareness training and have the greatest impact for all of your employees or customers.