Artificial Intelligence January 17, 2025 How to calculate your AI-powered cybersecurity’s ROI 4 min read - Imagine this scenario: A sophisticated, malicious phishing campaign targets a large financial institution. The attackers use emails generated by artificial intelligence (AI) that closely mimic the company’s internal communications. The emails contain malicious links designed to steal employee credentials, which…
Risk Management January 16, 2025 The current state of ransomware: Weaponizing disclosure rules and more 4 min read - As we near the end of 2024, ransomware remains a dominant and evolving threat against any organization. Cyber criminals are more sophisticated and creative than ever. They integrate new technologies, leverage geopolitical tensions and even use legal regulations to their…
Artificial Intelligence January 15, 2025 ISC2 Cybersecurity Workforce Study: Shortage of AI skilled workers 4 min read - AI has made an impact everywhere else across the tech world, so it should surprise no one that the 2024 ISC2 Cybersecurity Workforce Study saw artificial intelligence (AI) jump into the top five list of security skills. It’s not just…
Risk Management January 14, 2025 Why do software vendors have such deep access into customer systems? 4 min read - To the naked eye, organizations are independent entities trying to make their individual mark on the world. But that was never the reality. Companies rely on other businesses to stay up and running. A grocery store needs its food suppliers;…
Risk Management November 6, 2024 What Telegram’s recent policy shift means for cyber crime 4 min read - Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain…
Risk Management January 9, 2025 Cybersecurity trends: IBM’s predictions for 2025 4 min read - Cybersecurity concerns in 2024 can be summed up in two letters: AI (or five letters if you narrow it down to gen AI). Organizations are still in the early stages of understanding the risks and rewards of this technology. For…
Data Protection January 3, 2025 Router reality check: 86% of default passwords have never been changed 4 min read - Misconfigurations remain a popular compromise point — and routers are leading the way. According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the…
Risk Management January 13, 2025 How CTEM is providing better cybersecurity resilience for organizations 4 min read - Organizations today continuously face a number of fast-moving cyber threats that regularly challenge the effectiveness of their cybersecurity defenses. However, to keep pace, businesses need a proactive and adaptive approach to their security planning and execution. Cyber threat exposure management…
News January 13, 2025 Insights from CISA’s red team findings and the evolution of EDR 3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of…
Risk Management January 10, 2025 Is the water safe? The state of critical infrastructure cybersecurity 4 min read - On September 25, CISA issued a stark reminder that critical infrastructure remains a primary target for cyberattacks. Vulnerable systems in industrial sectors, including water utilities, continue to be exploited due to poor cyber hygiene practices. Using unsophisticated methods like brute-force…