One year after COVID caused companies to send droves of employees home to work remotely, how well did those employees do at protecting their clients’ and their company’s confidential information and what can they do better...more
IBM Security (the company’s cybersecurity division) has recently discovered a global phishing campaign targeting organizations associated with the critical coronavirus vaccine distribution chain. The division’s “X-Force,”...more
With the advent of artificial intelligence and the ubiquity of the internet of things (IoT), at some point customers may be able to drive into a dealership for tire and rim repairs with minimal wait time and an automated...more
Security researchers Intezer and IBM X-Force have identified a new ransomware that is seriously vicious. It’s PureLocker—named because it is programmed in PureBasic language, which is apparently unusual....more
Our weekly OTA & Travel Distribution Update is below. This week’s Update features a number of familiar stories....more
Blockchain - While many people in the U.S. are still skeptical that bitcoin will become a mainstream currency, both private and public sectors are gaining interest in the idea that the underlying blockchain technology...more
It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more
In the last month, both a federal and state court denied coverage for claims relating to an insured’s handling of electronic data. In the first case, a federal court held that there was no coverage under a cyber insurance...more
IBM researchers reported late last week that they have identified an increase in the use of Dyre Wolf malware which has contributed to the loss of millions of dollars from victim companies. Dyre Wolf allows the intruders to...more
For the last Tuesday in April, we have a few privacy and security bits and bytes to start your week. Trending Now – 5 Things Every Company’s Data Security Program Should Include... ...more