Tennessee: New state law to protect entities under cyber attack from class action suits amid Ascension Health hack

Another healthcare system is under a cyber attack, and while it’s unclear what, if any information has been accessed, a soon-to-be law will prevent those whose information may have been exposed from filing a class action lawsuit against entities that Read More …

Apple warns of “privacy and security threats” after EU requires it to allow sideloading

Despite several warnings about the risks, Apple will allow European iPhone owners to install apps obtained from outside the official App store (sideloading). These drastic changes are brought about to comply with the European Union’s (EU) Digital Markets Act (DMA). Read More …

A Log4Shell Retrospective – Overblown and Exaggerated

Two years ago, CVE-2021-44228 sent the security industry into a panic. The vulnerability, better known as Log4Shell, had security professionals working overtime through the holidays hunting down vulnerable log4j libraries. At the time, there was fear and confusion around what Read More …

Cyber attacks and dozy drivers: These are the future risks of self-driving cars

“A large cyber-terrorist attack targeting the operating systems of many self-driving vehicles simultaneously could cause mass casualties” – that is the alarming scenario presented by MPs after their investigation into autonomous cars on British roads. After a 15-month enquiry, the Read More …

Impact of SEC’s New Cybersecurity Policies

The rapid advancement of technology has led to an increasing number of cybersecurity incidents that pose significant risks to organizations, their stakeholders, and the general public. Recognizing the importance of transparent and timely reporting of such incidents, the U.S. Securities Read More …

Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things

The recently published United States National Cybersecurity Strategy warns that many popular Internet of Things (IoT) devices are not sufficiently secure to protect against many of today’s common cybersecurity threats. The strategy also cautions that many of these IoT devices Read More …

The 10th Annual Cyber Senate Control Systems Cybersecurity USA conference is coming to Nashville on the 19th and 20th of September.

This operational technology cyber security event is attended by leading Subject Matter Experts from the asset owner, technology and government sphere. This year’s focus will be on sharing collective experiences that can help organisations design and implement their transition plan Read More …

Transcending Silos: Improving Collaboration Between Threat Intelligence and Cyber Risk

Cyber Threat Intelligence (CTI) and risk management have emerged as distinct disciplines, yet they share many similarities in their mission. Both approaches inform decision-making by providing high-quality insight on the most relevant threats and risks impacting organizations. Although risk and Read More …