What is FIPS

FAQ: What is FIPS 140-2 and “Validated Cryptography”?

| | security
As time marches on and technology develops, there’s a constant push and pull between information security and attempts to breach that security. Obscurity – simply hiding from sight – isn’t enough with ...
SEC rules, cybersecurity, SEC cyber data breach rules

Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule

The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard

What is GRC, and Why is it Important for Cybersecurity?

Within cybersecurity, what is GRC, and why is it so important?  GRC is a benchmark for structured strategy, encompassing governance, risk, and compliance. These are important CISO responsibilities and as critical for ...

VMWare Urges Users to Uninstall EAP Immediately

VMware has issued a no-patch advisory urging users to take swift action by removing the deprecated Enhanced Authentication Plug-in (EAP). EAP was deprecated nearly three years ago, in March 2021, with the ...

Urgent Update: Patching Critical iOS Zero-Day Vulnerabilities

Apple rolls out crucial updates to thwart active cyberattacks exploiting kernel-level iOS zero-day vulnerabilities in iPhones In an important move to strengthen the security of iPhone users, Apple has recently released emergency ...

JetBrains TeamCity Vulnerability Requires Immediate Patching

TeamCity, the build management and continuous integration server from JetBrains, requires immediate vulnerability patching : TeamCity 2023.11.4 Update Here : JetBrains, the leading software development company, has issued an urgent security advisory ...
Privacy and AI Relationships: The Dangers of Trusting Your AI Girlfriend/Boyfriend

Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection

In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...

What Does The Mother of All Breaches (MOAB) Mean for Organizations?

What does the colossal data leak, the Mother of All Breaches (MOAB), mean for businesses around the globe? Recently, we witnessed a seismic event with the emergence of the Mother of All ...
Modern Data Storage

FAQ: What Are the DoD Requirements for Wiping Data?

| | security
In today’s digital age, destroying data is not as easy as it once was. Before the advent of computers, if you needed to destroy sensitive government information to prevent it from falling ...

Bringing Fashion Industry Cybersecurity in Vogue

Fashion industry cybersecurity needs to become a part of the industry fabric   As the fashion industry looks to the future with digital innovation, the looming shadow of cybercrime threatens to unravel ...