Data Privacy & Security

Has Silent Crow Hacked the Russian Government's Property Registry?
Cloud Security & Compliance Has Silent Crow Hacked the Russian Government's Property Registry?

Hackers identifying themselves as Silent Crow claim to have breached Rosreestr, the Russian government agency managing property and land records. They have reportedly released a partial database including names, birth dates, addresses, contact details, and insurance numbers of Russian citizens as

How Will New York’s Amended Data Breach Law Affect Businesses?
Cloud Security & Compliance How Will New York’s Amended Data Breach Law Affect Businesses?

On December 24, 2024, a significant change transpired in New York's legislative landscape as Governor Kathy Hochul signed an important amendment to the New York General Business Law § 899-aa. This amendment redefined the state's data breach notification requirements, introducing a clear and

Strategic Data Privacy: Navigating Regulations and Embracing AI Integration
Cloud Security & Compliance Strategic Data Privacy: Navigating Regulations and Embracing AI Integration

Data privacy has evolved from a mere compliance checkbox to a strategic priority for organizations. As regulations become more complex and AI adoption increases, businesses must adapt to protect sensitive data while leveraging technological advancements. This article explores the proactive measures

CISA Issues Directive to Boost Cloud Security for Federal Agencies
Cloud Management CISA Issues Directive to Boost Cloud Security for Federal Agencies

In a crucial move towards enhancing cybersecurity for federal agencies, the US Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01. This directive, titled "Implementing Secure Practices for Cloud Services," mandates that federal agencies

How Can Federal Agencies Safeguard Privacy Using CAI and AI Systems?
Cloud Security & Compliance How Can Federal Agencies Safeguard Privacy Using CAI and AI Systems?

In today's digital age, the handling of commercially available information (CAI) containing personally identifiable information (PII) by federal agencies has become a critical issue. The increasing use of artificial intelligence (AI) systems to analyze and utilize this data underscores the need for

Is Blue Yonder's Data Safe After Termite Ransomware Attack?
Cloud Data Is Blue Yonder's Data Safe After Termite Ransomware Attack?

In the wake of a recent ransomware attack, Blue Yonder, a renowned software supply chain company, has been thrust into the spotlight as it grapples with claims of a significant data breach. On November 21, the Termite ransomware group, an emerging threat in the cybercrime landscape, asserted

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later