A comprehensive third-party security program can align your vendor’s security with your internal security controls and risk appetite. Such a program...
Vulnerabilities That Allow Hijacking of Most Ransomware to Prevent File Encryption A cyber-attack is a malicious attack undertaken by cybercriminals ...
LinkedIn scammers attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using t...
In this interview for Help Net Security, Dimitri van Zantvliet Rozemeijer, CISO at Nederlandse Spoorwegen (Dutch Railways), talks about railway cybers...
The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target ...
The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud The world is a confusing and lonely place sometimes. Poli...