All Security Breaches and Attacks articles – Page 3
-
Feature
Elevate your cybersecurity with C2 Risk
Technology plays an integral role in both personal and professional aspects of our lives but the importance of robust cybersecurity cannot be overstated. With threats looming everyday, the C-Suite and organisations alike need to be proactive in securing their digital defences to protect themselves against potential risks posed by third-party suppliers.
-
Q&A
Meet the expert: Sudha Madhusudhan to speak at #RISK Amsterdam
We are delighted to announce that GRC leader, Sudha Madhusudhan is to speak at #RISK Amsterdam, opening this month.
-
News
Chatbot “prompt injection” risk issued by NCSC
Anxieties are now arising from the fact that chatbots interact with third-party applications and services, making them susceptible to malicious prompt injection.
-
Webinar
Latest Cybercrime Trends: How Can Your Organization Protect Itself?
Webinar produced by GRC World Forums in association with SoSafe
-
Webinar
Why Healthcare Organizations Need Modern IAM Solutions
Webinar produced by GRC World Forums in association with ManageEngine
-
News
Corporate secrets readily available on recycled company routers
New research into the fate of corporate network devices sold and bought on the secondary market represents a major cause for security concern.
-
News
Hybrid working may undermine organisational security
The impact of hybrid work on organisational security is a top concern for chief information security officers (CISOs), according to a new study.
-
News
Cybersecurity and compliance among bank directors’ concerns in US
An annual risk survey has revealed cybersecurity and compliance are a source of anxiety for US bank directors in 2023, with interest rates, deposit pricing and liquidity also causing concern.
-
News
Majority of companies in UAE and Saudi Arabia recognise need to bolster cybersecurity
Research released this week has given fresh insight into the current global threat landscape and recommendations on how organisations are working to improve their cybersecurity posture.
-
Feature
Meet the expert: Michelle Levesley to speak at PrivSec London
We are very happy to reveal that Cyber Awareness Lead, Michelle Levesley will be speaking at PrivSec London, next week.
-
Feature
Meet the expert: Luke O’Brien to speak at PrivSec London
We are very happy to announce that easyJet Cyber Security Chief Luke O’Brien will be speaking at PrivSec London, next week.
-
Feature
Meet the expert: Tim Burnett to speak at PrivSec London
We are very happy to announce that Cyber Security and Compliance chief, Tim Burnett will be speaking at PrivSec London, next week.
-
Training
ISO/IEC 27001:2022 and ISO/IEC 27002:2022, and how they affect your organisation
ISO/IEC 27001:2022 is the newest iteration of the international standard that sets out the specifications for an ISMS (information security management system).
-
Feature
New NIST Report: Integrating Cybersecurity Into Enterprise Risk Management
With cyberattacks becoming more devastating and complex, cybersecurity is at the forefront of public and government attention.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
News
NHS Contractor Cyberattack: Ransomware, Supply Chains and Operational Resilience
When an NHS service provider was hit by ransomware earlier this month, an NHS spokesperson said the health service had “tried and tested contingency plans in place” to protect its own network.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.