Login

Register

Login

Register

Day

January 22, 2020
Campaigners are threatening to take the Information Commissioner’s Office (ICO) to court for failing to enforce data protection laws in tackling what they see as widespread illegality in the adtech industry. The Open Rights Group (ORG) responded to an update from the ICO last Friday detailing what action has been taken since the latter’s June...
Read More
Security awareness training provider KnowBe4 has donated $250,000 to Stetson University College of Law, Florida’s first law school. The donation includes: Creation of the the KnowBe4 Cybersecurity Law Scholarship Fund which will provide $5000 merit-based scholarships for the next five years; Creation of the KnowBe4 Cybersecurity Law Program Fund to support the establishment and growth...
Read More
As awareness around privileged access management builds, enterprises should also put thought into architecting an effective PAM program with a risk-based approach While privileged access management (PAM) has garnered significant attention in recent years, a few challenges still persist that impede organizations from implementing it. For instance, most of the PAM offerings in the market...
Read More
Share Tweet Share Share Share Print Email All four of Greece’s main banking institutions enacted security protocols after a data breach, and consequently cancelled 15,000 consumer cards, according to reports. After consumer information was compromised on a tourist website, Alpha Bank, Piraeus Bank, Eurobank and the National Bank of Greece each cancelled their credit and...
Read More
The back panel of the Xbox Series X has been the subject of heightened speculation ever since AMD used a fake render of the upcoming console as part of its CES presentation. Now, alleged photos have appeared online of a prototype unit that may give some indication as to what Microsoft is preparing to ship....
Read More
Google plays a huge role when it comes to finding people that we are looking for. It’s prevalent and traditional that users go to Google and do a people search, as it’s the most approachable way in our hands. All you need is just a piece of information about the individual, such as their phone...
Read More
PARIS – Opening another front in their battle against the French government, protesting workers cut power to thousands of Parisians on Tuesday, plunging homes into darkness and shutting down trains to one of the capital’s main airports. The outage lasted about two hours. It hit users in the southern suburbs of Paris, which include the...
Read More
A researcher has discovered thousands of Tinder users’ images publicly available for free online. Aaron DeVera, a cybersecurity researcher who works for security company White Ops and also for the NYC Cyber Sexual Assault Taskforce, uncovered a collection of over 70,000 photographs harvested from the dating app Tinder, on several undisclosed websites. Contrary to some...
Read More
DevSecOps has become a real thing over the last few years. The big shift has been making security tools that developers can use. ShiftLeft has been one of the leaders in this movement, recognizing that security had to shift left (hence, the name). In this DevOps Chats, I had a chance to sit down right...
Read More
SAN ANTONIO – Six months ago, cybercriminals attacked local government agencies in 23 Texas cities. The statewide attack brought the Lone Star State to the front and center of the discussion about cybercrime. “Municipalities are always a target because we have very complex systems, broad responsibilities. Here in San Antonio, we have more than 40...
Read More
  The New York Times gloats over Harvey Weinstein’s misfortune By David Walsh 22 January 2020 “Every punishment, which does not arise from absolute necessity, says the great Montesquieu, is tyrannical.” Cesare Beccaria, On Crimes and Punishments The trial of film producer Harvey Weinstein, on five charges of sexual assault involving two women, is currently...
Read More
Estimated reading time: 2 minutes 14 Jan 2020 marked a huge day for Windows, as Microsoft ended support for Windows 7, the operating system that had been touching lives for nearly 11 years. Introduced almost a decade back, Windows 7 was designed basically to fix the failures that came with Windows Vista. The popularity of...
Read More
If your business accepts credit card payments, then you need to comply with PCI-DSS standards. PCI-DSS stands for Payment Card Industry Data Security Standard. These are sets of rules established to protect against credit card fraud, hacking, and other security breaches. Credit card issuers and companies that store, process, and transmit card information implement the...
Read More
WASHINGTON—Cybersecurity experts hired by Amazon.com Inc. founder Jeff Bezos have alleged that his phone was probably hacked in 2018 by a WhatsApp account associated with Saudi Crown Prince Mohammed bin Salman, according to a person familiar with the matter. A forensic audit of Mr. Bezos’ phone by FTI Consulting, a business advisory group based in...
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW