Consumer Financial Protection Bureau Reasserts Importance of Data Protection
Organizations with poor data security could be found in violation of the Consumer Financial Protection Act's prohibition on unfair acts or practices.
Friday Five 8/26
Read about why Twitter is coming under fire, how a cybersecurity organization may have gone on the offensive, possible big changes coming for software vendors, and much more in this week’s Friday Five!
How to Form a Data Recovery Plan: Your Five Step Guide
Creating a detailed disaster recovery plan (DRP) can be a daunting and complicated task. Begin forming your plan by including the following five essential steps.
FBI Warns Proxies, Configurations Seen in More Credential Stuffing Attacks
Attackers are using proxies and configurations to mask and automate credential stuffing attacks on US companies, the FBI warns.
Friday Five 8/19
Security issues in Apple devices and one of the largest DDoS attacks on record dominated the headlines this week. Read about these stories and more all in this week's Friday Five!
HHS Warns of New Phishing Scam Targeting Healthcare Orgs
The latest phishing campaign targeting the industry involves a convincing looking Evernote landing page.
FTC Considers Rulemaking Around Commercial Surveillance, Data Security
How do companies protect consumer data? That's one question the FTC is hoping to answer as it seeks rules to establish clear privacy and data security requirements.
How to Prevent Ransomware: 7 Tips to Avoid a Ransomware Attack
Trying to prevent ransomware at your organization? Having backups in place and an incident response plan are only part of it. Here are some tips on preventing and mitigating ransomware attacks.
NYDFS Proposes New Changes to Its Cybersecurity Rules
Recently proposed amendments to the NYDFS Cybersecurity Regulation would demand new technological enhancements, audit and risk assessment requirements of companies.
Expect Log4j to be Exploited "For Years to Come," CSRB Says
A new report, the first from DHS' Cyber Safety Review Board, includes recommendations to address the Log4j vulnerability.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!