FTC Busts $110m Charity Fraud Operation

FTC Busts 0m Charity Fraud Operation

The Federal Trade Commission (FTC) has joined forces with nearly 40 US states to crack a major charity fraud operation that scammed victims out of more than $110m. The regulator teamed up with 46 agencies from 38 states and Washington DC, most of them state attorneys general, to shut down the work of Associated Community Services (ACS), sister companies Central Processing Services and Community Services Appeal, and two other fund-raising spin-offs run by ACS managers,…

Read More

Mitigating the hidden risks of digital transformation

Mitigating the hidden risks of digital transformation

Companies are looking to grab any technology-driven advantage they can as they adapt to new ways of working, managing employees, and serving customers. They are making bigger moves toward the cloud, e-commerce, digital supply chains, artificial intelligence (AI) and machine learning (ML), data analytics, and other areas that can deliver efficiency and innovation. At the same time, enterprises are trying to manage risk — and the same digital initiatives that create new opportunities can also…

Read More

The cyber security risks of working from home – IT Governance blog

The cyber security risks of working from home – IT Governance blog

Organisations have had to overcome countless challenges during the pandemic, but one that has continued to cause headaches is IT security for home workers. A remote workforce comes with myriad dangers, with employees relying on their home networks – and sometimes their own devices – and without the assurance of a member of your IT team on hand if anything goes wrong. But unlike many COVID-19 risks, these issues won’t go away when life eventually…

Read More

Don’t throw out your prohibited thumb drives: Liberate your workers who need more IT freedom

Don’t throw out your prohibited thumb drives: Liberate your workers who need more IT freedom

Don’t throw out your prohibited thumb drives: Liberate your workers who need more it freedom | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

The fight against cyber threats requires a public-private partnership. Here’s how to get it done. | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

The Humanity and Evolution of Cyber – a look at its origin and usage

The Humanity and Evolution of Cyber – a look at its origin and usage

We see the word “cyber” everywhere today. It’s included in all the hashtags, events names and even in hand sanitizer available for purchase at Toys ‘R Us: Cyber Clean (72% ethanol alcohol, with aloe.) With the market booming and the buzzword exploding, many of us still don’t understand what this vague word means. We’re simply toeing the line, either reluctantly when our IT department sends out a reminder to complete our annual security training or…

Read More

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN

By Krupa Srivatsan, Director, Cybersecurity Product Marketing at Infoblox With the remote working trend on the rise due to the COVID-19 pandemic, many IT managers and corporate leaders have naturally been concerned about the challenges of securing employee’s access to the corporate network. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to securework from home’ users. These remote…

Read More

Working from Home? You’re Not Alone

Working from Home? You’re Not Alone

The rise of cyber hacks in an age of remote working – and how to prevent them By Steve Hanna, Embedded Systems Work Group Co-Chair at Trusted Computing Group (TCG) and Jun Takei, Japan Regional Forum Co-Chair at Trusted Computing Group Technology is replacing a number of real-life activities, helping to maintain a level of normalcy and connection with familiar faces amid unprecedented times. As remote working continues to prove an ever-essential trend in light…

Read More

Call the Doctor! mHealth Apps are Exposing Medical Records

Call the Doctor! mHealth Apps are Exposing Medical Records

By George McGregor, VP of Marketing, Approov A new report by Knight Ink, sponsored by Mobile API Security firm Approov describes how thirty leading mHealth applications were tested and everyone contained a vulnerability that exposed private patient data. If you have published a mobile healthcare app, you should be worried and this report should be essential reading. In this case, a medical practitioner may not be able to help you, but applying better security practices…

Read More
1 2,368 2,369 2,370 2,371 2,372 2,555