News

This new monthly column will tackle the philosophical, moral, strategic, and organizational quandaries related to higher education cybersecurity, privacy, and data. This month, Mike answers your ...
founder of The Cyber Security Expert. “The biggest disadvantage to working from home/remotely from this sort of risk perspective is that people can’t just turn to the person … [sitting] next to them ...
"We experienced a cyber incident. While this is unfortunate, it's not something we were unprepared for," reads a letter from Cellcom CEO Brighid Riordan. "We have protocols and plans in place for ...
Peter Green Chilled, a major distributor of chilled and fresh products to British supermarkets, has reportedly fallen victim to a ransomware attack orchestrated by an as-yet unnamed cyber criminal ...
Access Cyberhunt - a collection of short 5-15 min conversation starters, warm-up activities, or challenges Get a collection of cyber security posters Students can engage in interactive and short ...
A new AI chatbot called Venice.ai has gained popularity in underground hacking forums due to its lack of content restrictions. According to a recent investigation by Certo, the platform offers ...
NHS England has introduced a Cyber Security Charter, hopefully improving the digital safety and resilience of the health service’s supply chain In an open letter addressed to current, prospective, and ...
Top cybersecurity officials within the UK government and the National Health Service (NHS) are asking CEOs of tech suppliers to pledge their allegiance to sound security by signing a public charter.
Senior officials of England’s health service have written to suppliers to the NHS urging them to meet the requirements of a new cyber security charter. They have published an open letter to CEOS of ...
“Their impact extends far beyond generous financial contributions – they are a cornerstone of our annual Cyber Security Summit, create invaluable networking and learning opportunities for IT ...
The Open Cybersecurity Schema Framework is an open-source project, delivering an extensible framework for developing schemas, along with a vendor-agnostic core security schema. Vendors and other data ...
When it spotted the intrusion, it activated its incident response plan, brought in a third-party cybersecurity company to assist, and notified relevant law enforcement agencies. However ...