Intelligence & Analytics November 27, 2024 What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast 4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected. But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of…
Risk Management November 26, 2024 83% of organizations reported insider attacks in 2024 4 min read - According to Cybersecurity Insiders’ recent 2024 Insider Threat Report, 83% of organizations reported at least one insider attack in the last year. Even more surprising than this statistic is that organizations that experienced 11-20 insider attacks saw an increase of…
News November 25, 2024 CISA adds Microsoft SharePoint vulnerability to the KEV Catalog 3 min read - In late October, the United States Cybersecurity & Infrastructure Security Agency (CISA) added a new threat to its Known Exploited Vulnerability (KEV) Catalog. Cyber criminals used remote code execution vulnerability in Microsoft SharePoint to gain access to organizations’ networks. The…
Risk Management November 22, 2024 What does resilience in the cyber world look like in 2025 and beyond? 6 min read - Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years.…
Risk Management November 6, 2024 What Telegram’s recent policy shift means for cyber crime 4 min read - Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain…
Data Protection November 19, 2024 Communication platforms play a major role in data breach risks 4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it…
Cloud Security November 14, 2024 Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future 3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is…
Risk Management November 21, 2024 Airplane cybersecurity: Past, present, future 4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor…
Risk Management November 20, 2024 Protecting your digital assets from non-human identity attacks 4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are…
Data Protection November 19, 2024 Communication platforms play a major role in data breach risks 4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it…