Deeper Dive: Drive Incident Response Preparedness & Response Improvement
One of the most important metrics in our report is the incident response (IR) timeline, which tracks the average time […]
One of the most important metrics in our report is the incident response (IR) timeline, which tracks the average time […]
American companies that fall victim to data breaches want to retaliate against the culprits. But can they do so without […]
After many months of discussion and a public consultation, the European Commission presented its proposal for a “Regulation on cross-border […]
A little-known data firm was able to build 48 million personal profiles, combining data from sites and social networks like […]
Nearly half the businesses in the UK have fallen victim to cyberattacks or security breaches in the last year, costing them each thousands of […]
Government hacking and surveillance received heavy criticism at the OURSA Conference by ACLU lawyer Jennifer Granick, who questioned how the […]
A Match Group spokesperson confirmed that a “limited number” of old accounts had been accidentally reactivated recently and that any […]
Citizens may object to their social media mining by law enforcement, but the practice can keep the public safe. Police […]
The new EU General Data Protection Regulation (GDPR) will require that companies that process personal data inform the relevant data […]
So far in the No boundaries series, we’ve uncovered how web trackers exfiltrate identifying information from web pages, browser password […]
On April 16, 2018, the National Institute of Standards and Technology (NIST) unveiled Version 1.1 of its widely known Cybersecurity […]
Almost three years ago, the global domain name authority ICANN chartered a working group to consider how to build a […]