Data compromises in the US saw a dramatic spike from 2022 to 2023, rising from 1,802 incidents to 3,205. In 2024, the Identity Theft Resource Center (ITRC) continued to track data compromises, finding ...
Just one month into the new administration, we are already seeing a glimpse of how cybersecurity will be evolving in the year ahead. It should come as no surprise that artificial intelligence (AI) ...
Cybersecurity must be reimagined with AI technologies, strong governance and operational discipline, and rapid skill and ...
A 4.1% increase in military cyber funding in the FY2026 NDAA budget underpins new requirements for hardened mobile devices, AI security frameworks, and expanded DoD cyber workforce authorities. On Dec ...
On January 16, 2025, President Joe Biden issued the “Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity,” a comprehensive directive designed to address the growing ...
Cybersecurity has become a pivotal business imperative, transcending mere technical challenges. While many organizations still view cybersecurity as an IT issue, the reality is that it fundamentally ...
The faulty CrowdStrike software update that triggered IT outages on a global scale in July was a sobering reminder of the importance of incident response and business continuity plans. The update ...
There must be a consideration of the ethical question of contributing to the payment of extortion demands of cybercriminals. Any company that is paying a cyber insurance premium, regardless of whether ...
The short-term measure gives lawmakers extra time to iron out differences between House and Senate versions of the renewal. Congress Cyber Threats House appropriators unveiled a temporary funding plan ...
Cyber security regulations are a mechanism for innovation rather than something that stifles it, according to Despina Spanou, the European Commission’s principal advisor for cyber security ...
Training: Within six months of the Final Rule’s effective date, training must be conducted on recognizing and detecting cybersecurity threats and all types of cyber incidents, techniques used to ...