Risk Management November 20, 2024 Protecting your digital assets from non-human identity attacks 4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are…
Data Protection November 19, 2024 Communication platforms play a major role in data breach risks 4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it…
News November 18, 2024 Research finds 56% increase in active ransomware groups 4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now…
Risk Management November 15, 2024 Cybersecurity dominates concerns among the C-suite, small businesses and the nation 4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise…
Risk Management November 6, 2024 What Telegram’s recent policy shift means for cyber crime 4 min read - Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain…
Cloud Security November 14, 2024 Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future 3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is…
Risk Management November 13, 2024 Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity 4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, “nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic…
Cloud Security November 14, 2024 Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future 3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is…
Risk Management November 13, 2024 Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity 4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, “nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic…
Risk Management November 12, 2024 6 Principles of Operational Technology Cybersecurity released by joint NSA initiative 4 min read - Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become…