Live Webinar | Considerations for Building Your Cybersecurity Strategy in 2021 and BeyondWebinar.
Thank you for registering with ISMG
Complete your profile and stay up to date
Because it is privately held, Colonial is under less pressure than a publicly traded company might be to reveal details. But as the custodian of a major piece of the nation’s cyberinfrastructure, the company is bound to come under scrutiny over the quality of its protections and its transparency about how it responded to the…
Entities using the name and iconography of hacktivist collective Anonymous have deemed Elon Musk’s recent crypto-tweeting worthy of a re-emergence. A new video that uses the group’s trademark Guy Fawkes mask and a digitised voice opens by voicing appreciation for Musk’s contributions to space exploration and electric car production, but then accuses him of being…
In their Carbis Bay communique, the G7 announced their intention to work together to tackle ransomware groups. Days later, US president Joe Biden met with Russian president Vladimir Putin, where an extradition process to bring Russian cybercriminals to justice in the US was discussed. Putin reportedly agreed in principle, but insisted that extradition be reciprocal….
The U.S. Securities and Exchange Commission (SEC) this week announced sanctions against several companies over cybersecurity failures that resulted in email accounts getting hacked and the exposure of customer information. A total of eight entities belonging to three companies have been sanctioned by the SEC, including Cetera (Advisor Networks, Investment Services, Financial Specialists, Advisors, and…
Britain needs to boost its capacity to conduct cyber attacks on foreign enemies, Prime Minister Boris Johnson said before the publication of a national security review this coming week. “Cyber power is revolutionising the way we live our lives and fight our wars, just as air power did 100 years ago,” Johnson said in a…
Are you doing enough to prevent scammers from hijacking your social media accounts? Even if you have chosen a strong, unique password for your online presence and enabled two-factor authentication it’s possible that you’ve overlooked another way in which online criminals could commandeer your social media accounts and spam out a message to your followers….