Top news of the week: 06.04.2021.
Threats And Attacks
Mind the Gap: How the NSA might use SolarWinds campaign to do warrantless spying
Officials have said the SolarWinds hacking campaign succeeded in part because of a gap in NSA surveillance power. But what exactly is the gap and how might the gov use it to gain domestic ...
Top 10 cybersecurity lessons learned one year into the pandemic
Enterprises dealt with the pandemic by adopting new work methods and requirements. Here are the cybersecurity lessons they've learned.
Innovations And Trends
How businesses can protect against payment fraud post-COVID-19
By Pierre-Antoine Dusoulier, Founder and CEO, iBanFirst The impact of COVID-19 on fraud and security COVID-19 has caused an acceleration in the use of digital technologies across all ...
Industrial Digital Transformation Framework: Elements of a Successful Digital Transformation Program
In this dynamic, complex, and fast-moving space, ARC's Digital Transformation Advisory Service provides the intelligence you need to incorporate the latest developments and best practices ...
Data Privacy
The Little-Known Data Broker Industry Is Spending Big Bucks LobbyingCongress
Data brokers’ millions of dollars in lobbying spending in 2020 rivaled that of some Big Tech firms
You Can Fight Facial Recognition
How to opt out of tech that invades your privacy
Startups And Investments
A New Study On Data Privacy Reveals Information About Cybersecurity Efforts
A study revealed by Cisco shows that most organizations around the world were unprepared for the increase in remote work.
What is cyber risk quantification, and why is it important?
One way to get C-level managers and cybersecurity department heads on the same page is to employ cyber risk quantification, as it speaks to costs versus risks.
Companies And Services
Buying Breached Data: When Is It Ethical?
Security practitioners often tread a fine and not entirely well-defined legal line in collecting current and meaningful research. This research can also pose ethical questions when ...
US to publish details on suspected Russian hacking tools used in SolarWinds espionage
U.S. military and security officials are preparing to publish one of their most detailed analyses yet of the hacking tools used by suspected Russian spies in a campaign that the Biden ...
Business And Industries
Molson Coors Cyberattack, Storms Could Cost Company $140 Million
Brewing giant Molson Coors said that a disruptive cyber attack, combined with winter storms in Texas, could cost the company upwards of $140 million in short-term EBITDA.
Most common cybersecurity mistakes that companies make
What are the mistakes that companies make when setting up their cybersecurity system and how can they avoid them to be protected from cyber-attacks?