Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies
Twitter has major security problems that pose a threat to its own users' personal information, to company shareholders, to national security, and to democracy, according to an explosive whistleblower disclosure obtained exclusively by CNN and The Was.....»»
Microsoft says Apple makes it impossible for cloud gaming services to exist on the App Store
Apple and Microsoft are again fighting about the topic of cloud gaming services and the App Store. Apple updated its App Store policies earlier this year to allow cloud gaming apps. However, Microsoft has blasted the company in a submission to a gove.....»»
Managing low-code/no-code security risks
Continuous threat exposure management (CTEM) – a concept introduced by Gartner – monitors cybersecurity threats continuously rather than intermittently. This five-stage framework (scoping, discovery, prioritization, validation, and mobili.....»»
Cybersecurity is top of mind for consumers when shopping online, according to Experian
The credit reporting agency surveyed consumers in March and roughly 80 percent said they were somewhat or very concerned about conducting activities online......»»
DEI policies work best when they are designed to include everyone and are backed by evidence, says researcher
As the U.S. becomes increasingly polarized, diversity, equity and inclusion—also known as DEI—efforts have been touted as a way to bridge social divides and promote a sense of belonging for everyone, especially for those who have been traditional.....»»
Researcher: Apps, 911 services and mobile phones don"t offset deadly consequences of more restrictive border policies
The U.S.-Mexico border is once again dominating a U.S. presidential election......»»
Celebrity group"s 4 dealerships sue CDK over cyberattack
Celebrity Motor Car Co.'s four dealerships have all sued CDK Global, accusing it of soliciting business by relating the risks of a dealership breach and the cybersecurity CDK could provide — only to be hacked itself and unavailable to retailers aft.....»»
Study finds lower-income NYC residents trade comfort for affordability
In a revealing piece of research coauthored by a Singapore Management University academic, public policies to ease urban heat in one of the largest first world cities have seen price gaps emerge between homes in cooler and hotter areas, with lower-in.....»»
Audi to get Porsche exec as sales chief, reports say
Marco Schubert, who has led Porsche's European sales since 2021, will succeed Hildegard Wortmann at Audi, according to media reports......»»
Accenture expands partnership with Google Cloud to boost AI adoption and cybersecurity
Accenture and Google Cloud announced that their strategic alliance is advancing solutions for enterprise clients and seeing strong momentum across industries in two critical and related areas: GenAI and cybersecurity. As part of the announcement toda.....»»
A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
Cyber threats that shaped the first half of 2024
Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU) analyzed 3,438.....»»
CrowdStrike reveals impact of calamitous July IT outage on its business
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
RISCPoint RADAR provides real-time vulnerability detection across multiple attack surfaces
RISCPoint Advisory Group launched RADAR, an all-in-one cybersecurity platform. Combining continuous threat discovery with expert-led Penetration Testing as a Service (PTaaS), RADAR represents a significant leap forward in proactive security and risk.....»»
So, how’s CrowdStrike doing?
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
The NIS2 Directive: How far does it reach?
The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»
Ford joins Harley in scaling back DEI policies amid backlash
Ford is joining Harley in scaling back DEI policies amid a backlash......»»
Ineos Automotive shuffles exec roles after key departures
Two Ineos Automotive executives have been given new roles within the young automaker......»»
Study explores how active management relates to Australian forest management
Acting President of Forestry Australia Dr. Bill Jackson says "active management" is a common term in Government and forest stakeholder reports, policies, and strategies in Australia and around the world, but up until now, it has not been well defined.....»»
Q&A: How should the labor movement handle the challenges of AI, automation at work?
Robert Bruno is a professor of labor and employment relations at the University of Illinois Urbana-Champaign and the director of the Project for Middle Class Renewal, a research-based initiative tasked with investigating labor policies in today's eco.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»