IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Managing Cyber Risks Initiative

Understanding how to minimize risk and increase cyber resilience

News
While new artificial intelligence technologies could be used for nefarious purposes such as creating more convincing phishing attacks, experts say the technology might also automate and strengthen IT security protocols.
This type of attack involves using face-swapped videos to try to trick online verification systems, but as they rise in prevalence, so too do methods for combating them.
The New Mexico Administrative Office of the District Attorneys was still trying to get its main computer servers working Thursday after ransomware locked prosecutors across the state out of files.
From the SolarWinds hack to the more recent, serious disruptions of Microsoft and Change Healthcare, cyber attacks on industries that do business with universities create vulnerable points of entry for cyber criminals.
A state spokesman says all normal business operations have been restored. Meanwhile, the hacktivist group, Anonymous Sudan, is claiming credit for the attack through statements on its Telegram channel.
Sponsored News
Sponsored
After briefly stirring into life as COVID-19 restrictions were lifted, companies and entire economies are again stepping on the brakes as they brace for yet another “current situation.”
Sponsored
Since the cybersecurity sector first emerged, network defenders have been locked in a perpetual arms race with their adversaries. This translates into a continuous quest for more security solutions.
Sponsored
State and local government (SLG) organizations are null that impact and disrupt citizen services.