Cyber Threat Alliance Welcomes ExtraHop as Newest Member

Cyber Threat Alliance (CTA), a nonprofit organisation focused on enhancing global cybersecurity, has recently welcomed ExtraHop as its newest member. This move strengthens CTA’s efforts to promote collaboration among leading cybersecurity firms in the sharing of threat intelligence, thereby contributing to a more resilient digital environment. Source: Cyber Threat Alliance Key Points ExtraHop joins the […]

Read More →

Experts wade in as M&S plays down ‘cyber incident’

Marks & Spencer (M&S) is currently facing scrutiny following a ‘cyber incident’ that affected its online orders and contactless payments. The retailer has apologised to customers and reported the incident to the National Cyber Security Centre. M&S insists it is actively working to resolve the issues and has hired cybersecurity experts for assistance. The company […]

Read More →

Severance: what the hit show can teach us about cybersecurity and human risk

Summary In the Apple TV series Severance, employees undergo a procedure that separates their work memories from their personal lives. This narrative mirrors a pressing issue in cybersecurity: insider threats. Instead of truly solving the problem, Severance acts as a cautionary tale, illustrating the complexities of human behaviour in the face of security measures. The […]

Read More →

China: New rules issued to further regulate application of face recognition technology in China

Summary On 21 March 2025, the Cyberspace Administration of China (CAC) and the Ministry of Public Security (MPS) jointly introduced the Measures for the Administration of the Security of the Application of Face Recognition Technology (“FR Measures”), set to take effect on 1 June 2025. These measures aim to regulate the processing of facial data […]

Read More →

Cybersecurity jobs available right now: April 23, 2025

April 2025 brings an exciting lineup of cybersecurity job opportunities around the world. Whether you’re looking to work remotely or on-site, there’s a role for you in this booming field. From security analysts to architects, these positions cater to various expertise and preferences. Key Points Diverse job openings in cybersecurity from leading companies across the […]

Read More →

Delivery Texts: Scam or Legit?

Delivery scam texts impersonating carriers like FedEx and UPS are becoming more frequent, making it crucial for consumers to learn how to identify fake messages and protect their personal information. Source: Consumer Reports Key Points Increase in scam delivery texts and emails, often appearing urgent. Scam messages can claim missed deliveries or ask for personal […]

Read More →

Game Plans and Playbooks: Building and Implementing a Cybersecurity Strategy

In this insightful podcast episode, Christina Morillo, Head of Information Security at the NFL’s New York Giants, reveals the secrets to crafting a robust cybersecurity strategy. The discussion delves into the importance of curiosity over rigid plans, addressing common misconceptions in cybersecurity, and the crucial step of moving from strategy to implementation. Christina shares valuable […]

Read More →

Responding to a Cyber Attack – Key Considerations for GCs and CISOs

As companies pivot from worrying about “if” they’ll face a cyber attack to “when,” it becomes clear that preparation and strategic planning are critical for navigating risks related to regulatory actions, reputational damage, and potential litigation. This article from Skadden’s experts delves deep into what financial services firms need to consider when a cyber attack […]

Read More →

Debunking Myths About Data Breach Disclosures in Higher Ed

The article discusses common misconceptions surrounding data breach disclosures in higher education institutions. Karen Scarfone, a cybersecurity consultant, highlights the importance of understanding these myths to effectively manage data breaches and ensure compliance with relevant laws. Key Points FERPA does not mandate data breach notifications; it only requires documentation of student record exposure. Universities must […]

Read More →