
World Password Day 2022: All You Want to Know
One of the most fun and effective ways to spread public awareness about a topic or issue is to commemorate it by devoting a specific day in its honor. With the help of powerful social media forums and passionate advocates, everything from puppies to pirates can be...

NVIDIA Data Breach: Information on Employee Data Theft
Blog NVIDIA, famous for designing graphics processing units and integrated circuits, recently became the latest victim of a serious cyberattack. Officials confirm that the incident occurred on February 23, 2022, resulting in the online leaking of employee...

Nearly Two-Thirds of Ransomware Victims Paid Ransoms in 2021
Leading research and marketing firm CyberEdge Group, which serves companies in the cybersecurity industry, just published its ninth Cyberthreat Defense Report (CDR). This report acts as the standard for gauging organizations’ security postures, documenting the...
What You Need to Know About PCI DSS 4.0 New Requirements
In keeping with its ongoing goal of safeguarding cardholder information, the PCI Security Standards Council (PCI SSC) is rolling out a new version of its Payment Card Industry Data Security Standard (PCI DSS). This updated iteration came from extensive feedback from...

New US Law to Require Cyber Incident Report
Cybersecurity concerns have gained even greater significance in the recent Russia-backed SolarWinds sabotage and the Ukrainian war. In response, the US House and Senate will soon pass the Cyber Incident Reporting for Critical Infrastructure Act of 2022. Shortly after...

Multiple Security Flaws Discovered in Popular Software Package Managers
Recent security vulnerabilities in popular software package managers are raising concerns among digital safety experts. When these flaws compromise machines, it may be possible for hackers to get their hands on sensitive information, including source code and access...

Mobile Threats Skyrocket
Although mobile devices are portable, powerful, and convenient, their use in employees' jobs is coming at a price. The very features that make them compelling also render them especially vulnerable to hacking. Data shows that nearly one-third of zero-day attacks now...

Hacked US Companies to Face New Reporting Requirements
When cybercriminals target sensitive data or charge companies or agencies a ransom to retrieve their encrypted information, the consequences can be dire. In response, Congress has passed a bill that will require that entities who deal with critical US security-related...

2022 Revisions to ISO 27002
Blog Impacts on ISO 27001 ISO 27002 is the companion standard to ISO 27001 and provides best practices for implementing information security controls. The latest version, ISO 27002:2022, was published on February 15, 2022, and replaces ISO 27002:2013. ISO...

SOC 2 Report Example
Blog SOC 2 reports are essential for any organization that handles customer data, ensuring that your systems are secure, available, and private. Essentially, a SOC 2 report gives your customers peace of mind, knowing that their information is in safe hands. ...