Call 855-808-4530 or email Gro[email protected] to receive your discount on a new subscription.
Hiring new employees is a critical function of doing business, and the onboarding process transcends industry, company size, and physical location. Organizations often need new talent to capture opportunity, optimize productivity, expand into new sectors, build products, and strengthen existing services. However, personnel transitions are equal opportunities for threat actors, and in some cases criminals, to exploit the hiring and onboarding process for the purposes of gaining unauthorized access to a valuable target. With new employees come new risks; from aspiring insider threats that intend to join a target to extract sensitive information, to insecure processes being exploited due to too much trust being placed in candidates and new hires.
Continue reading by getting
started with a subscription.
New U.S.-China Investment Dynamic Focuses On AI and Sensitive Technologies
By David A. Holley
An Executive Order released by the Biden Administration on Aug. 9 places increased importance on due diligence when investing in specific foreign countries. The Executive Order will regulate outbound investments in China with a focus on key technologies critical to safeguarding U.S. national security, including artificial intelligence.
New York’s Latest Cybersecurity Commitment
By Erik B. Weinick
On Aug. 9, 2023, Gov. Kathy Hochul introduced New York’s inaugural comprehensive cybersecurity strategy. In sum, the plan aims to update government networks, bolster county-level digital defenses, and regulate critical infrastructure.
Data Breach Defense: Mobilizing Against Weaponized Mass Arbitration
By Daniella Main and Brooke Bolender
Most companies have experienced or will experience a data breach. Increasingly, companies also face the risks associated with mass arbitration weaponized by the overwhelming volume of claims after a breach.
By Wim Nauwelaerts
Businesses and organizations that (regularly) transfer personal data from the EU to the U.S. should carefully assess, on a case-by-case basis, whether it makes sense to rely on the new EU-U.S. Data Privacy Framework or to use one of the other data transfer tools that are available under the GDPR.