Policy

  • Rising Threats in Supply Chain Security Demand Increased Vigilance and Strategy

    As cyber adversaries infiltrate software and hardware supply chains, organizations must enhance their cybersecurity strategies, focusing on continuous monitoring and the use of advanced tools like Software Bill of Materials and artificial intelligence to combat emerging threats.


  • China Emerges as Major Cyber Threat to US, Experts Warn

    At the RSA Conference, retired Rear Admiral Mark Montgomery warned that China has eclipsed Russia as the leading cyber threat to the US, exemplified by the Volt Typhoon attacks targeting critical infrastructure. The former national security official emphasized the urgent need for enhanced cybersecurity measures and military recruitment to counter this sophisticated adversary.


  • Data Breach at Blue Shield of California Raises Concerns Over Cloud Misconfigurations

    Blue Shield of California has reported that a misconfiguration of Google Analytics led to the exposure of personal health information of 4.7 million subscribers, prompting discussions on cloud security and data handling best practices. Experts emphasize reading service documentation and assessing what data is shared and collected.


  • Navigating Third-Party Vendor Risks: Strategies for CISOs

    With third-party vendors becoming vital to business operations, Chief Information Security Officers must assess and mitigate associated risks to safeguard sensitive data. The strategies outlined emphasize the need for comprehensive vendor evaluations and collaborative relationships.


  • New Research Unveils ChoiceJacking Threat Amid Juice Jacking Defenses

    Researchers at the Graz University of Technology have uncovered a new attack method named ChoiceJacking, which exploits flaws in existing defenses against juice jacking on iOS and Android devices. This vulnerability allows malicious chargers to access sensitive data without user consent, prompting renewed warnings about the risks of public charging stations.


  • Emerging Threat: Gray Bots Reshape Digital Landscape Amid AI Surge

    Gray bots, a new category of automated online programs, are significantly impacting the digital landscape by posing challenges for publishers and marketers. While these bots drive innovation for AI technologies, they also strain digital infrastructures and distort analytics, leading to increased concerns about data scraping and content theft.


  • Organizations Progress on Zero Trust Journeys, Yet Challenges Remain

    A recent Gartner survey indicates that while 63% of organizations are implementing zero trust security strategies, many face significant challenges in fully realizing their potential due to cultural and operational hurdles.


  • Bridging the Gap: Addressing the Delay Between Security Detection and Remediation

    As software releases accelerate, critical security measures are struggling to keep pace, with organizations taking months to resolve vulnerabilities while attackers act within days. Analysts stress the need for improved integration between security and development processes to mitigate risks effectively.


  • OECD Releases Initial Reports Under G7 Hiroshima AI Process, Enhancing Global AI Transparency

    The OECD has published the first round of reports from the G7 Hiroshima AI Process Reporting Framework, enhancing global transparency into AI governance practices as organizations worldwide participate in this significant initiative.


  • Marks & Spencer Faces Payment Disruption Following Cyber Incident

    Marks & Spencer is facing disruptions in contactless payments due to a cyber incident, with delays to Click & Collect orders and home deliveries. The retailer assures customers it is taking measures to resolve the situation while expressing gratitude for their understanding.