More recently, on May 21, the SEC staff issued further guidance to clarify the distinction between two types of Form 8-K disclosures: Item 1.05, which should be used to disclose material cybersecurity ...
Popular file transfer tool MOVEit's recent data security vulnerability prompted many businesses to communicate, internally and externally, about the impact of the incident on its business. Businesses ...
Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack. In a startling discovery, a recent report found ...
ISACA has published a new quick reference document designed to help organizations prepare to mitigate ransomware incidents. The guide, titled Ransomware Incident Management Quick Reference, is a ...
We've been hearing a lot about software supply chain attacks over the past two years, and with good reason. The cybersecurity ecosystem and industry at large have been inundated with warnings about ...
Don’t wait until it’s too late to discover your IR plan has holes. Download our resource to secure your strategy and your schools. Rebecca Torchia is a web editor for EdTech: Focus on K–12. Previously ...
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up for any (or all) of our 25+ Newsletters. Some states have laws and ethical rules regarding solicitation and ...
In today’s digital landscape, the importance of an effective security plan cannot be overstated. Such a plan is vital for safeguarding sensitive information and critical assets. Within this ...
Cybersecurity in higher education presents a unique and evolving challenge. As someone who has spent years in incident response, digital forensics and security engineering, I’ve seen firsthand the ...
HHS’ Office for Civil RIghts, which oversees HIPAA and health information privacy rights, released a “quick-response checklist” to support healthcare organizations. The checklist — and associated ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results