Wind turbine giant Vestas says data was compromised in security incident

Written by Tim Starks Nov 22, 2021 | CYBERSCOOP One of the world’s largest wind turbine manufacturers, Vestas Wind Systems, says it’s contending with a cyberattack that forced the firm…

What is Endpoint Security?

A significant portion of cyberattacks target endpoints, either individually or as gateways to the larger company network. Unfortunately, this is not a singular threat, but a layered issue: hackers exploit…

K-12 School Districts Failing at Cloud Security

K-12 School Districts Failing at Cloud Security American K-12 school districts are vulnerable to cyber-attacks targeting data in cloud applications, according to new research. A study conducted by the EdWeek Research Center and commissioned…

What Is Privileged Access Management (PAM)?

To understand what privileged access management is, we need to first understand what privileged access refers to. This article will cover many aspects of PAM, including definition, importance, functionality, statistics,…

Government Plans Regulation to Bolster Supply Chain Security

Government Plans Regulation to Bolster Supply Chain Security Government regulation could be on the way to force improvements in supply chain security after industry feedback and new research pointed to…

US Journalist Imprisoned for Spreading False Information is Freed

US Journalist Imprisoned for Spreading False Information is Freed An American journalist who was sentenced to prison in Myanmar for disseminating fake or incendiary information has been freed. Danny Fenster was arrested…

US and Israel Agree Anti-Ransomware Coalition

US and Israel Agree Anti-Ransomware Coalition The US and Israel yesterday announced a new bilateral partnership designed to tackle ransomware. The move comes as part of the new US-Israeli Task Force…

China looks to classify online data in draft security laws

China has released draft regulations that seek to classify online data based on their importance to national security and public interest, amongst others. Data protection requirements then will be tied…

What Is DMARC?

Protecting your emails is crucial for keeping your clients safe from malicious actors attempting to steal their private data. In this blog post, we’ll take a closer look at DMARC,…

Congress Mulls Ban on Big Ransom Payouts

A bill introduced this week would regulate ransomware response by the country’s critical financial sector. A U.S. lawmaker has introduced a bill – the Ransomware and Financial Stability Act (H.R.5936)…