By Aly McDevitt2022-02-02T13:00:00
The field of cybersecurity features a growing list of terminology to describe the many forms, channels, and motivations behind cyberattacks and hacking culture. Learn further definitions for some key terms featured throughout the ransomware case study.
Take this self-directed, interactive immersive study of a fictional cyber event based on real-life scenarios to deepen your understanding of the importance of crisis management planning and put you in the shoes of a compliance leader during a ransomware attack.
2025-09-09T21:29:00Z By Adrianne Appel
Google allegedly collected personal data from mobile devices without permission, violating California privacy laws, a jury ruled in awarding more than $425.6 million to class-action plaintiffs.
2025-09-09T16:51:00Z By Oscar Gonzalez
A Houston-based freight forwarder, Fracht FWO Inc., will pay $1.6 million for violating U.S. sanctions tied to Venezuela and Iran, according to the Treasury Department’s Office of Foreign Assets Control (OFAC). The fine comes as OFAC ramps up enforcement in recent months.
2025-09-08T16:49:00Z By Jaclyn Jaeger
Cyber threats, climate-related catastrophes, and disruptive technologies remain top risks reshaping the U.S. insurance industry. The question is how chief risk officers at the nation’s largest insurers are confronting them.
2024-03-21T16:00:00Z By Aly McDevitt
Both JPMorgan Chase and Deutsche Bank retained their respective Jeffrey Epstein relationships for too long. Yet, there is a case to be made for why exiting a high-risk relationship too soon can become an inverse form of recklessness.
2024-03-20T16:00:00Z By Aly McDevitt
Why did JPMorgan Chase retain Jeffrey Epstein for more than a dozen years? How did the relationship persist despite glaring red flags? The “why” is straightforward; the “how” is more complicated.
Site powered by Webvision Cloud