By Kyle Brasseur2022-03-29T16:13:00
Ukrainian telecommunications company Ukrtelecom is in the process of restoring its services after a “powerful” cyberattack wreaked havoc on its operations.
2022-03-03T21:45:00Z By Aaron Nicodemus
As the West seeks to isolate Russia, the country might retaliate with state-sponsored cyberattacks. Although Russia is suspected to have launched such attacks before, the scale and scope could be much bigger this time, experts warn.
2025-09-30T20:04:00Z By Ruth Prickett
Regulators are pressuring retail compliance teams on supply chains, shifting sanctions and tariffs, sustainability, and digital commerce. Rising cyberattacks heighten data security concerns, while large retailers push legal and commercial requirements down their supply chains.
2025-09-29T20:59:00Z By Ruth Prickett
Most major organizations are not changing their ESG reporting plans, despite “regulatory ambiguity”, according to a report by consultancy KPMG. The researchers say this indicates market expectations are driving action as much as legal requirements.
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud