The Department of Commerce and Department of Homeland Security Secretaries publicly released their report to the President, Supporting the Growth and…
News facts: Fujitsu Protected Cloud SaaS solution aimed at government agencies to enable digital transformation in a trusted and secure…
NIST is releasing a draft white paper, A Data Structure for Integrity Protection with Erasure Capability, for public comment. It…
In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber…
We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable…
It is clear we weren’t sure where to start or close this conversation, but Liesl Yearsley, CEO & Founder…
INTRO For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching…
A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data…
When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?…
Early in 2018, Proofpoint researchers observed a rise in so-called “cryptocurrency giveaway scams.” The scams often target users of Ethereum…