Category: CyberDefenseMagazine
The recent massive data breach at National Public Data may have exposed anywhere from 1.3 million to 2.9 billion financial records and…
Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned…
1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse…
It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any…
Arriving on 17th October this year, NIS 2 is the EU’s most stringent cybersecurity Directive so far. Your level of cybersecurity…
It is a tale almost as old as time: users click download, install, and accept as they adopt new software…
One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer,…
Achieving cybersecurity compliance is often seen as a regulatory necessity, primary to avoid hefty fines and legal repercussions. However, the…
There’s an unnerving secret many of us in cybersecurity have noticed. And if you think your company is “too small”…
The healthcare sector has become a prime target for cyberattacks, with the frequency and sophistication of these attacks increasing rapidly…
It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a…
The cyber threat landscape continues to evolve rapidly. The year has not ended yet but we have witnessed an increasing…











