By
Jaclyn Jaeger2019-08-02T17:15:00
Cisco has reached an $8.6 million settlement for knowingly selling video surveillance software with critical security vulnerabilities. It’s believed to be the first cyber-security whistleblower case of its kind successfully litigated under the False Claims Act.
2025-10-24T18:57:00Z By Ruth Prickett
“Hallucinatory” citations and errors in an AI-assisted report produced by Deloitte for the Australian government should be a wake-up call for compliance officers about the risks of placing too much trust in AI.
2025-10-24T18:05:00Z By Adrianne Appel
Nine states are collaborating to write and enforce comprehensive data privacy laws, in an effort to protect consumers across jurisdictions and due to the absence of a broad, federal privacy law.
2025-10-23T20:36:00Z By Jaclyn Jaeger
It has been nearly six months now since the Department of Justice’s (DOJ) Criminal Division released its memorandum on the selection of compliance monitors. This article provides a critical analysis of the monitorships that received early terminations, those that remain in place, and the broader compliance lessons they impart.
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud