Why Privileged Access Management (PAM) is Essential for Protecting State, Local, and Education Data (SLED)

Privileged Access Management (PAM) is becoming a buzzword, but it’s genuinely crucial. With state, local, and educational organisations (SLED) often handling large troves of sensitive data, strong access management is vital to guard against today’s cyber threats. Cybercriminals are always on the hunt, targeting these organisations to probe for weaknesses that can lead to data […]

Read More →
Pro

Just Because You Passed an Audit Doesn’t Mean You Are Cyber-Secure

Imagine sitting in a boardroom, surrounded by your team, ready to toast a successful audit completion. The report reads: “No significant findings,” and “Compliant with all standards.” It’s tempting to assume that this marks a win for your organisation and a high point in your career as a CIO. But are you truly secure, or are you just playing the compliance game?

Read More →

The history and evolution of ransomware attacks

The History and Evolution of Ransomware Attacks Ransomware is a buzzword in the headlines as individuals and companies continue to suffer from attacks that have a surprisingly long and twisted history. From the early days of floppy disks to sophisticated cybercrimes demanding cryptocurrency, the evolution of ransomware is a tale worth knowing. Source: Article URL […]

Read More →

Chris Krebs, who debunked 2020 election lies, vows full-time fight against Trump

Chris Krebs, who debunked 2020 election lies, vows full-time fight against Trump Summary Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), has left his position at SentinelOne to focus on opposing the Trump administration after being targeted in a recent executive order. This move comes after Krebs was dismissed by […]

Read More →

National Academies report offers recommendations for improving Justice Dept. cyber crime metrics

National Academies report offers recommendations for improving Justice Dept. cyber crime metrics The National Academies of Sciences, Engineering and Medicine has put forward a new report aimed at reforming cyber crime measurement for the Justice Department. This framework aims to enhance the metrics of cyber incident reporting as growing concerns about cybercrime escalate with the […]

Read More →

House panel to hold May hearing on reauthorization of 2015 information sharing law

House panel to hold May hearing on reauthorisation of 2015 information sharing law The House Homeland Security cyber subcommittee is gearing up for a May hearing aimed at reauthorising the Cybersecurity Information Sharing Act (CISA) of 2015. This act, according to Chairman Andrew Garbarino (R-NY), plays a crucial role in enhancing cybersecurity measures, especially in […]

Read More →

Former NSC cyber official Neuberger joins Stanford security policy center

Former NSC Cyber Official Neuberger Joins Stanford Security Policy Center The Stanford Center for International Security and Cooperation has welcomed Anne Neuberger, previously President Biden’s leading cyber official at the National Security Council, as a guest lecturer and researcher. She will be collaborating with Stanford faculty to enhance the study of cyber policy and risk […]

Read More →

Consumer Technology Association emphasizes benefits of IoT cyber labeling program to new FCC chair

Consumer Technology Association emphasizes benefits of IoT cyber labeling program to new FCC chair The Consumer Technology Association is getting vocal about the advantages of the FCC’s Internet of Things cyber labeling programme, as they address Chairman Brendan Carr directly. This initiative is crucial for bolstering national security in our increasingly connected world. Source: InsideCyberSecurity.com […]

Read More →
Pro

China Cybersecurity and Data Protection: Monthly Update – April 2025 Issue

China Cybersecurity and Data Protection: Monthly Update – April 2025 Issue Summary This monthly update provides insights into China’s ongoing developments in cybersecurity and data protection as of April 2025. It highlights the latest legislative changes, enforcement actions, and industry initiatives that are crucial for understanding the evolving landscape of data security in China. Source: […]

Read More →

Proving The Value Of Security Operations Centers When Nothing Is On Fire

Proving The Value Of Security Operations Centers When Nothing Is On Fire Summary This article discusses the vital role of Security Operations Centers (SOCs) in safeguarding organisations from cyber threats, especially when no immediate attacks are occurring. It highlights how SOCs can prove their worth by measuring their activities and outcomes, ensuring that they continue […]

Read More →