Category: EN

ISO 27001:2022: chapter by chapter description

Contents Toggle What’s New in ISO 27001:2022 Chapter 1-3: Scope, Normative References and  Terms and Definitions Chapter 4: Context of the Organization Goal Actions Implementation Chapter 5: Leadership Goal Actions Implementation Chapter 6: Planning Goal Actions Implementation Chapter 7: Support…

Giant Tiger Data Breach: Customers Data Exposed Via Vendor

Giant Tiger, a prominent Ottawa-based discount retailer, has announced a breach of customer data. This incident, linked to a third-party vendor responsible for managing the retailer’s customer communications and engagement, has put the personal information of an undisclosed number of…

Podcast Episode: About Face (Recognition)

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Is your face truly your own, or is it a commodity to be sold, a weapon to be used against you? A company called Clearview AI has scraped the internet to…

Medusa Ransomware group demands $700k from victims

Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting…

How threat intelligence data maximizes business operations

Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a…

Strengthening critical infrastructure cybersecurity is a balancing act

In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience against cyberattacks. How do current cybersecurity strategies address the critical infrastructure sectors’…

Scammers exploit tax season anxiety with AI tools

25% of Americans has lost money to online tax scams, according to McAfee. Of the people who clicked on fraudulent links from supposed tax services, 68% lost money. Among those, 29% lost more than $2,500, and 17% lost more than…

Tech industry’s focus on innovation leaves security behind

The rapid digital transformation and technological progress within the technology sector have enlarged the attack surface for companies operating in this space, according to Trustwave. As the sector evolves, the proliferation of Software-as-a-Service (SaaS) providers, cloud infrastructure, and internet-connected systems…

Cybersecurity Governance: Ensuring Effective Oversight

Safeguard your organization with effective cybersecurity governance – are you truly prepared for what lies ahead? The post Cybersecurity Governance: Ensuring Effective Oversight appeared first on Security Zap. This article has been indexed from Security Zap Read the original article:…

New Zealand to world: China attacked us, too!

Reveals 2021 incident that saw parliamentary agencies briefly probed The government of South Pacific island nation New Zealand has revealed that it, too, has been attacked by China.… This article has been indexed from The Register – Security Read the…

Secure Software Development: Building Resilient Applications

Bolster your applications against cyber threats with essential secure software development strategies – discover the keys to resilience. The post Secure Software Development: Building Resilient Applications appeared first on Security Zap. This article has been indexed from Security Zap Read…