Between the lines, Dido Harding admits that the board didn't listen to or understand their cyber-security teams - who weren't forceful enough in articulating business risk.
A remote access trojan that apparently went undiscovered for at least two years was found targeting Koreans in a spam campaign using the possible upcoming US-North Korea nukes summit as a phishing lure.
Europol this week announced the formation of a "Dark Web Team" specifically dedicated to investigating and shutting down underground internet marketplaces, with the assistance of law enforcement agencies.
Eventbrite-owned Ticketfly took its websites offline after a saying it was "the target of a cyber-incident." The company didn't specify whether or not user information has been compromised but did acknowledge the incident in a tweet.
As the energy sector becomes increasingly targeted by cyber-attackers, it seems curious that smart grids and wider critical infrastructure haven't adopted similar bug bounty programmes.
Unfortunately for banks, cyber-attacks have evolved into a variety of advanced exploits and the countermeasures haven't kept pace.
M&As require integration of thousands of IT assets and systems onto a single, hybrid network, with unknown cyber-risks, and other complicating factors such as legacy systems or contrasting IT guidelines and security policy.
Only a third of British businesses have a financial plan in place in case of a cyber-attack. Research from Lloyds Bank reveals only half of companies contemplate the risks of a cyber-attack at board level.
Just as we are getting used to attackers whose motivation is primarily financial, along come a new breed of attackers who aren't interested in money, says Khaled Fattal, chairman of the MLi Group.
An 18-year-old from Sussex has triumphed at the Cyber Security Challenge UK 2016, making him the youngest ever winner of the competition.
Protecting consumers' online digital personas is as important for the organisations collecting the data as it is for the people who are putting their faith in them.
What are indicators of exposure and how do they differ from indicators of compromise? In this video, we talk to Gidi Cohen, founder and CEO of Skybox, about how to use indicators of exposure to identify potential weaknesses in your system.
Wed June 13, 2:00 pm et
What if you could prevent attacks before they occur and spend less time managing multiple agents?
Thu June 14, 2:00 pm et
Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better...