This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Three industries were targeted the most by cyberattacks— transportation, where state-sponsored threat actors seek to disrupt the logistical and supply capability of rivals, and banking and legal, which are industries rich with sensitive information.
Mimecast Ltd., Lexington, Mass., released its quarterly report, “Threat Intelligence Report: Risk and Resilience Insights,” which provides technical analysis and observations of evolving threats from the Mimecast Threat Center from July to September.
Despite some high-profile incidents, such as natural disasters, many businesses seem to be unaware of the disruption these external forces might have on their wider operations.
Nearly 82% of U.S. companies say they would like to expand into new markets, including 36% that are eyeing expansion opportunities in the BRICS (Brazil, Russia, India, China and South Africa) and MINT (Mexico, Indonesia, Nigeria and Turkey) countries, according to a survey released by Vuealta, London.
Businesses and organizations involved in growing, distributing and supplying food must be able to withstand and rebound from acute disruptions such as civil unrest and cyber attacks, as well as those with more gradual impact, such as drought, rising sea level or funding cuts.
A new study from the Johns Hopkins Bloomberg School of Public Health, Baltimore, Md., highlights characteristics of organizations involved in the food system that may lead them to be more prepared to respond to such disasters, and outlines opportunities for local, state and federal organizations to improve resilience across the urban food system.
Although the food and beverage industry isn’t the stereotypical cyberattack target, every business with an internet connection has a bullseye on its back.
The goal of the Advisory Council is to have a unified voice for merchants in the cybersecurity space. The organizations will collaborate on educational resources, building trust in the community and other initiatives.
The Retail Cyber Intelligence Sharing Center (R-CISC), home of the Retail ISAC, Washington, D.C., formed an Advisory Council tasked with gathering together leading trade associations representing merchant industries to provide a broader perspective across priorities and visibility on key cybersecurity issues.
Hiscox, Chesapeake, Va., released its 2018 Hiscox Small Business Cyber Risk Report, which revealed data on U.S. small businesses’ preparedness for cyber threats.
The worldwide cybersecurity skills gap continues to present a significant challenge, with 59% of information security professionals reporting unfilled cyber/information security positions within their organization, according to new cybersecurity workforce research from ISACA, Schaumburg, Ill.
Kenna Security, San Francisco, unveiled a new research report conducted in partnership with the Cyentia Institute, Blacksburg, Va., that provides an analysis of today’s common vulnerability management strategies.
For food manufacturers, achieving the full potential of the IIoT will instead be an evolutionary process, as a full blown “rip and replace” implementation is not realistic.
Bromium, Inc., Cupertino, Calif., released new research that found security professionals admit to knowingly circumventing security protocols and hiding discovered breaches.