More from Information Security – Page 30
-
NewsMalaysia to beef up cyber security
The Malaysian government will establish a more systematic command centre to oversee cyber security, said communications and multimedia minister Datuk Saifuddin Abdullah.
-
NewsFraudsters and hackers became more active in UK during pandemic
Fraud and computer misuse offences rose in Britain during the country’s anti-coronavirus lockdowns, according to data released this week by the Office of National Statistics (ONS).
-
NewsHacked Saudi Aramco data ‘for sale’
Threat actors are reportedly offering 1 TB of proprietary data stolen from the Saudi Arabian Oil Company on the darknet for a negotiable price of $5m (€4.25m).
-
NewsData from price comparison website breached in cyber attack
Ransomware attackers forced Swiss price comparison website comparis.ch offline for two days last week with the associated data breach probably resulting in client data being stolen, Zurich police say.
-
VideoKabir Barday, CEO of the fastest growing company in America, OneTrust in conversation for GRCTV
Exclusive conversation with Kabir Barday, CEO of OneTrust the #1 fastest growing company in America and Jay Cline, PWC’s US Privacy Leader
-
NewsThink tank calls for brake on drift towards data localisation
The Information Technology and Innovation Foundation (ITIF) has urged governments to resist the trend towards restricting data flows between countries.
-
NewsUS and allies accuse China of global hacking spree
The United States and its allies have publicly accused China of a worldwide cyber espionage campaign, with US secretary of state Antony Blinken saying the activity posed “a major threat to our economic and national security”.
-
NewsTests validate accuracy of face recognition software’s for boarding flights
The National Institute of Standards and Technology (NIST) in the US has found facial recognition algorithms can identify a passenger’s face with at least 99.5% accuracy using a single scan.
-
WebinarData Acceleration in the Era of Accelerated Cloud Transformation and Remote Work
Based on the findings from 2021 Thales European Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working.
-
NewsInterpol chief calls for action to avoid ransomware pandemic
The world’s police forces have to form a global coalition with private partners to prevent a potential ransomware pandemic, according to Interpol’s secretary-general Juergen Stock.
-
NewsByteDance ‘calls off IPO’ amid data concerns
Chinese owner of video app TikTok, ByteDance, is said to have indefinitely put on hold intentions to make an initial public offering (IPO) of shares offshore after government officials told the company to focus on addressing data security risks.
-
NewsChina plans to upgrade cyber security sector
The Ministry of Industry and Information Technology (MIIT) in China has issued a draft plan to develop the country’s cyber security industry for the next three years.
-
NewsUS devising ways of countering ransomware attacks
The Biden administration is finalising a strategy on how to deter companies from paying out to cybercriminals who hit them with a ransomware attack. Key allies are doing the same.
-
NewsGarante serves up change for Foodinho
Food delivery company Foodinho has to amend how it processes riders’ data through a digital platform, says Italy’s data protection authority Garante.
-
NewsREvil hits thousands in largest-ever ransomware attack
Hackers REvil, aka Sodinokibi, has forced businesses and organisations worldwide to shut down in a supply chain attack which cyber security specialists say is without precedent in scale for criminal hackers.
-
SponsoredOneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
WebinarOneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.
-
SponsoredOneTrust GRC: Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what actions can you take to enhance insights today that will support risk quantification in the future!
-
NewsSalvation Army struck by ransomware attack
The Christian charity has become the latest victim of a ransomware attack.
-
WebinarData Retention: The Achilles Heel of Global Privacy
Consumers around the world are demanding more protection for their personal information. Data breaches are daily occurrences, and the scope of privacy has widened to include how your organization limits the risk of improper use or exposure of personal data.


