A summary of the report, dated October 31 and published on Monday, stated that since the OIG's previous audit, the CFPB's ...
The University of Pennsylvania has confirmed that a “sophisticated social-engineering attack” was responsible for last week’s ...
An IG audit found that the CFPB hasn’t maintained “an effective level of awareness of security vulnerabilities” following staff departures and diminished contractor support.
Global conflicts and tariff wars are opportunistic incidents for adversaries, especially those targeting operational ...
In the Nov. 4 email, Joshua Beeman — the interim vice president of information technology and interim chief information ...
Recorded Future’s CEO talks threat intelligence, AI in cyber security, and the ever-changing cyber threat landscape.
SRM Tech has announced that it has successfully attained the Trusted Information Security Assessment Exchange (TISAX) label, ...
The first sign of the hack appeared on Friday with an email to 700,000 students, alumni, and parents that railed against the ...
The United States’ Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI), in collaboration with the ...
The virtualized layer of technology underpinning modern IT deployments is transforming from a strength to a cybersecurity ...
Learn how to build secure, enterprise-ready SaaS applications. This guide covers development, ops, and product security best practices for meeting enterprise requirements.
The President of the Federal Office for Information Security has called for changes to the hacker paragraph. Support comes ...