- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Kyle Brasseur2022-03-29T16:13:00
Ukrainian telecommunications company Ukrtelecom is in the process of restoring its services after a “powerful” cyberattack wreaked havoc on its operations.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2022-03-03T21:45:00Z By Aaron Nicodemus
As the West seeks to isolate Russia, the country might retaliate with state-sponsored cyberattacks. Although Russia is suspected to have launched such attacks before, the scale and scope could be much bigger this time, experts warn.
2025-04-17T14:00:00Z Provided by ProcessUnity
Join us for a live webcast to learn how the newest risk exchange models are eliminating 80 percent of questionnaire requests with data.
2025-04-16T16:00:00Z By Aaron Nicodemus
The U.S. Department of Justice ended two compliance monitorships on Glencore International more than a year early, monitorships imposed in 2022 after the company was convicted of paying bribes and manipulating commodities markets.
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud