Can U.S. law enforcement use a warrant to seize emails stored outside the U.S. by a cloud services provider? That's the question the Supreme Court has agreed to consider next year. Microsoft continues to fight an order to turn over emails stored in an Irish data center.
A look at President Donald Trump's pick for the Department of Homeland Security secretary, Kirstjen Nielsen, leads the latest edition of the ISMG Security Report. Also featured: Equifax's and TransUnion's problem with dubious code.
The GDPR impacts all organisations that are established in the EU, or that either offer goods or services to Europeans or monitor the behaviour of Europeans (which applies to most internet-based organisations). All such organisations must make certain they have appropriate technical and organisational measures to...
Third party risk management is imperative today for organizations large and small. Senior executives and Boards of Directors are increasingly asking for updates into their vendor risk management programs and looking for demonstrable progress in reducing third party cyber risk.
While Finance organizations tend to...
An apparently misconfigured Amazon repository that exposed on the web medical data for approximately 150,000 patients serves as another important reminder of the need to protect cloud-based health information from being inadvertently accessible to the public.
A Belgian security researcher has discovered a "serious weakness" in the WPA2 security protocols used to encrypt many WiFi communications. Attackers can exploit the flaws to eavesdrop as well as potentially inject code such as malware or ransomware into WiFi-connected systems. Prepare for patches.
The RSA Conference returns to Abu Dhabi in November, and event organizers Linda Gray Martin and Britta Glade say this year's agenda is packed with new speakers and topics unique to this growing annual event.
Security researchers have discovered websites run by credit bureaus Equifax and TransUnion were both affected by dodgy code that redirected users to adware and malware. Both issues are fixed, but the situations beg questions about how closely the companies monitor their online security.
Artificial Intelligence (AI) and machine learning are among the top industry buzzwords of the year. But how can AI truly make a significant impact on organizations' cybersecurity operations?
Download this eBook that discusses:
The value and limits of traditional AI
Why and how the human element is critical to...
Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data - and hold it hostage until payment is made. So how can you keep your organization's data protected?
Download this whitepaper and learn:
Why ransomware has seen such explosive growth
How to recover encrypted data more...
Is the European GDPR going to change your data security strategy?
Organizations around the world that serve customers and individuals in the EU will be required to put in place security policies to address different risks and effectively enforce these policies with technical controls - or potentially face fines of...
Assessing and assigning trust in endpoints is a big challenge enterprises face as they move to the cloud. However, a strategy exists which can protect apps and data across many endpoint scenarios, allowing IT to maintain balance between access and risk.
Download this whitepaper and learn how to:
It's a tale that reads stranger than fiction, a true Tom Clancy-ish yarn: Israeli spies hacked Kaspersky Lab, discovering that Russia has been using the company's pervasive anti-virus software to spy on U.S. spies. Will Kaspersky Lab survive?
A hacker exploited an unpatched, 12-month-old flaw in a small Australian defense contractor's IT help desk and stole data for the country's F-35 Joint Strike Fighter program, among other secrets, the Australian government has warned.