Cybersecurity Tech Accord Principle #3: Capacity Building The third Cybersecurity Tech Accord principle says that “we will help empower users, customers and developers to strengthen cybersecurity protection” which means ensuring Read more…

Due to evidence of active exploitation, CISA added three vulnerabilities to its Known Exploited Vulnerabilities Catalogue.

Every chief information security officer knows it isn’t a matter of “if” but “when” the systems that run their business will be disrupted in some way.

The Federal Trade Commission has denied a motion filed by H&R Block Inc. to disqualify the Administrative Law Judge overseeing the hearing concerning a complaint filed by the Commission against Read more…

93% of hackers believe AI tools used by companies have opened up a new attack vector for malicious actors to exploit.

The effect of cybersecurity incidents on healthcare organizations was analyzed in a recent Proofpoint report.

New research shows the current threats associated with the 2024 Presidential Election.  

Phishing remains the primary method used by attackers to gain initial access to networks, according to a recent report.

The Federal Trade Commission today announced a final “click-to-cancel” rule that will require sellers to make it as easy for consumers to cancel their enrollment as it was to sign Read more…

The Federal Trade Commission has taken action against coffee shop franchise Qargo Coffee and its founders for failing to disclose critical information required by the Franchise Rule, including one founder’s Read more…

error: Content unreachable !!