Let's take a look at AGAT's reg-tech product today: Real-Time Audio DLP for Microsoft Teams. Many users are already used to dealing with DLP (Data Leak Prevention) policies when using UC (unified communications) software such as Skype for Business, Microsoft Teams, WebEx, Slack, etc.
An investigation by 17 media organizations around the world has revealed that authoritarian governments, criminal and terrorist organizations have targeted executives, human rights activists, journalists, academics, and government officials for years. While there has been heavy speculation around this being the case, a data leak of more than 50,000 phone numbers revealed a list of identified persons of interest by clients of NSO since 2016.
The attacks on the world’s largest meat supplier, JBS, from May 30, 2021, took place by theRansomware-as-a-Service (RaaS) group REvil (also known as Sodin/Sodinokibi), the FBI informed. Such attacks could endanger the global food supply chain, and show the vulnerable state of critical infrastructure worldwide.
Increased availability and adoption of 5G technology means a more connected world, which in turn means more users with a greater variety of devices. While this means that IT security teams will have more to manage, many of the leading security vendors have been planning for 5G for years.
Which Comes First: EPP, EDR or XDR? Recently there have been a few industry reports that have shed light – perhaps a confusing light – on BlackBerry’s cybersecurity vision. Rest assured, we are not wavering in our beliefs or slowed in our production. In fact, we’ve doubled the size of our portfolio in the last few months alone. We’ve released a new generation (the seventh) of our Cylance® AI engine math model (although our five-year-old model prevented Darkside just fine).
Workplace harassment can be a serious issue and an HR nightmare. Managers can bully employees, employees could insult one another and the dreaded sexual harassment may threaten the safety of the workplace. When bullying, insults, and sexual harassment occur in the workplace, a hostile work environment is created damaging morale and productivity. Organizations are liable to prevent any and all types of harassment.
On Tuesday June 8th, iConstituent, a technology vendor used by dozens of House offices on Capitol Hill, became the latest high-profile victim of a ransomware attack. This crippling cyberattack on the constituent-outreach company comes on the heels of successful ransomware campaigns against a major U.S. pipeline system, Colonial Pipeline, the world’s largest meat supplier JBS, and electronics giant Acer.