Zehra Hussain is an Incident Response Analyst based in Sydney, Australia. Her role involves responding to security incidents and ensuring the protection of sensitive data and systems. With a background in digital forensics and satellite engineering, Zehra brings unique expertise…
Tag: EN
Considerations for Managing Digital Sovereignty: The Executive Perspective
Business leaders must frequently balance the advantages of cloud computing and the free flow of data across geographic borders with the need to abide by local laws and regulations. This article has been indexed from Dark Reading Read the original…
The President’s EO on AI – What it Does and Why it Won’t Work
President Biden’s EO lacks the effect of law, does not mandate much of anything and overlooks some of the trickiest AI issues. The post The President’s EO on AI – What it Does and Why it Won’t Work appeared first…
Hacker Threat: Israeli Police Advise Citizens not to Answer Unknown Calls
The Israeli Police and the National Cyber Directorate have advised citizens against answering unexpected WhatsApp calls from abroad. This is because it may be a sign of an attempt to hack a phone. Authorities claim that a high volume…
SEC’s Legal Action Against SolarWinds and CISO Creates Uncertainty in Cybersecurity
In the lawsuit, the plaintiffs allege that CISO Timothy Brown, who was in charge of managing the company’s software supply chain at the time of the massive cyberattack, has failed to disclose critical information regarding the attack. Several government…
The FTC’s new Amendment Requires Financial Institutions to Report Security Breaches Within 30 Days
The Federal Trade Commission has recently enacted an amendment that mandates non-banking entities to notify the Federal Trade Commission of specific data breaches along with other security incidents. This mandate requires the creation, execution, and upkeep of an extensive security…
Identiv Enterphone Mobile protects users against security breaches
Identiv introduces Enterphone Mobile, a highly secure mobile application that brings real-time audio capabilities to the front end, elevating visitor management and perimeter security in residential and commercial spaces. The new mobile app is a key feature in the refreshed…
Oracle Enables MFA by Default on Oracle Cloud
Mandatory multifactor authentication is just the latest in Oracle’s commitment to have security built-in by default into Oracle Cloud Infrastructure. This article has been indexed from Dark Reading Read the original article: Oracle Enables MFA by Default on Oracle Cloud
KandyKorn macOS malware lobbed at blockchain engineers
North Korean hackers are using novel MacOS malware named KandyKorn to target blockchain engineers of a cryptocurrency exchange platform. The attack By impersonating blockchain engineering community members on Discord, the attackers used social engineering techniques to make victims download a…
Apple Disappoints As FY23 Results Decline
Declines for Mac, iPads and wearables, home and accessories, plus gloomy holiday season outlook, dents Apple’s Q4 and full year results This article has been indexed from Silicon UK Read the original article: Apple Disappoints As FY23 Results Decline