- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Aaron Nicodemus2020-06-18T17:00:00
Cyber-security protections deployed for some of the nation’s most secret data was “woefully lax,” according to a 2017 intelligence brief that detailed shortcomings at the CIA following the agency’s 2016 data breach.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2020-07-13T15:55:00Z By Kyle Brasseur
The United States has been on the receiving end of more significant cyber-attacks over the last 14 years than triple any other country, according to new research.
2020-06-26T18:09:00Z By Aaron Nicodemus
A bill with bipartisan Congressional support proposes to create a national cyber-security czar who would report directly to the president.
2025-04-11T16:32:00Z By Adrianne Appel
Banks alerted authorities to $1.4 billion in suspicious transactions in 2024, a big assist in the nation’s fight against crime and fentanyl trafficking, according to the Financial Crimes Enforcement Network.
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud