Tag: EN

What Android security threats should IT know about?

<p>From OS vulnerabilities to ransomware attacks, Android devices continue to face a variety of security risks. As soon as Google fixes one problem, another threat comes along.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

Policy vs Standard vs Procedure: why, what, how

Ever wondered what the differences between these terms are? We use them in GRC very often, but we rarely think what they mean. This creates in time some stretching of these concepts, meaning that their meanings overlap to a certain…

BSidesSF 2025: The Four Tribes Of Security Champions

Creator, Author and Presenter: Marisa Fagan Our deep appreciation to Security BSides – San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView…

What is information security (infosec)?

<p>Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information. It involves the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction and unauthorized…

Zscaler Confirms Exposure in Salesloft-Linked Data Breach

  Zscaler has confirmed that it is among the latest organizations to be impacted by a major supply chain attack exploiting the Salesloft Drift application, which integrates with Salesforce.  According to the company, attackers managed to steal OAuth tokens tied…

How Tampa General Hospital worked to quantify cyber risk

The medical center’s CIO and CISO teamed up to translate security decisions into dollars and cents. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: How Tampa General Hospital worked to quantify cyber risk