Category: CyberSecurity-Insiders

Seventh-annual Hacker-Powered Security Report Reveals Hackers’ Plans for GenAI, Bounty Milestones and More
01
Nov
2023

Seventh-annual Hacker-Powered Security Report Reveals Hackers’ Plans for GenAI, Bounty Milestones and More

HackerOne has just released its seventh-annual Hacker-Powered Security Report, based on data from its vulnerability database, views from HackerOne customers and…

Navigating Security, Business Continuity, Through a Downturn
31
Oct
2023

Navigating Security, Business Continuity, Through a Downturn

Steve Durbin, Chief Executive, Information Security Forum With inflationary pressures mounting and downturn fears hovering, it’s natural for organizations to scale back on their…

AI CyberSecurity Risks: Equip Your Employees To Think Like a Hacker
31
Oct
2023

AI CyberSecurity Risks: Equip Your Employees To Think Like a Hacker

By Eric Jacksch, CPP, CISM, CISSP, ELB Learning Cybersecurity Consultant The rapid expansion of AI has graced us with what…

Generative AI and Cybersecurity in a State of Fear, Uncertainty and Doubt
31
Oct
2023

Generative AI and Cybersecurity in a State of Fear, Uncertainty and Doubt

by Jason Rebholz, Chief Information Security Officer, Corvus Insurance Organizations are finding innumerable ways to incorporate generative artificial intelligence (GenAI) and large…

Generative AI: The Unseen Insider Threat
31
Oct
2023

Generative AI: The Unseen Insider Threat

by Steve Povolny, Director, Security Research at Exabeam Artificial intelligence, or AI, as it’s commonly known, is all the rage…

The Evolution of Financial Fraud
31
Oct
2023

The Evolution of Financial Fraud

By Greg Woolf, CEO of FiVerity The marriage of fraud and artificial intelligence (AI) is lethal. Right now, fraudsters are…

India witnesses biggest data breach of Aadhaar details via ICMR
31
Oct
2023

India witnesses biggest data breach of Aadhaar details via ICMR

Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There…

Cyber Attack on NATO and Ransomware Attack on Motel One
31
Oct
2023

Ransomware news trending on Google

1.) A ransomware group known as “Play” has recently issued a concerning statement. They have threatened to release the personal…

Killware vs. Ransomware: Key Differences
30
Oct
2023

Google App turns into malware for many on Smart Phones

The Google app and its synchronized applications, including Maps and Gmail, offer a world of possibilities to users. However, a…

A New Tactic to Combat Cyber Warfare: Diversity as Digital Defense
30
Oct
2023

A New Tactic to Combat Cyber Warfare: Diversity as Digital Defense

By Reinier Moquete, Founder and CEO, CyberWarrior.com Attackers are constantly evolving the tools they use, learning how defenders are protecting…

Privacy in the Age of AI: Strategies for Protecting Your Data
30
Oct
2023

Privacy in the Age of AI: Strategies for Protecting Your Data

Artificial intelligence is no longer just the stuff of science fiction; generative AI tools are seeing massive adoption rates. Unsurprisingly,…

Beware of Data Security Monsters Lurking in the Shadows this Halloween
30
Oct
2023

Beware of Data Security Monsters Lurking in the Shadows this Halloween

Claude Mandy, Chief Evangelist at Symmetry Systems The Halloween season is filled with fear of ghosts and goblins, but it’s…