Data Protection December 20, 2024 How to craft a comprehensive data cleanliness policy 3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential. But what does this involve, and…
Risk Management December 19, 2024 2024 roundup: Top data breach stories and industry trends 3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was…
Risk Management December 19, 2024 Black Friday chaos: The return of Gozi malware 4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system…
Cloud Security December 18, 2024 Cloud Threat Landscape Report: AI-generated attacks low for the cloud 2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and…
CISO December 13, 2024 Making smart cybersecurity spending decisions in 2025 4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it…
Risk Management November 6, 2024 What Telegram’s recent policy shift means for cyber crime 4 min read - Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain…
Incident Response December 9, 2024 How I got started: Incident responder 3 min read - As a cybersecurity incident responder, life can go from chill to chaos in seconds. What is it about being an incident responder that makes people want to step up for this crucial cybersecurity role? With our How I Got Started…
Artificial Intelligence December 17, 2024 Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models 4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook. With the average cost of a data breach reaching an all-time high of $4.88 million…
News December 16, 2024 FBI, CISA issue warning for cross Apple-Android texting 3 min read - CISA and the FBI recently released a joint statement that the People’s Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility…
CISO December 13, 2024 Making smart cybersecurity spending decisions in 2025 4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it…