Category: CyberSecurity-Insiders

Preparing Digital Identity for the Post-Quantum Era
20
Oct
2023

Getting your organisation post-quantum ready

[ This article was originally published here ] While quantum computing is still very much in its early stages, it’s…

Exploitation of Artificial Intelligence AI technology to facilitate password theft
20
Oct
2023

Netflix password sharing crackdown yields excellent results

For all those who were accustomed to sharing their Netflix passwords with friends and family, here’s an important update on…

FTC starts data security probe on ChatGPT OpenAI
20
Oct
2023

The Unyielding Importance of Cybersecurity in Times of Recession

In times of economic recession, as budgets tighten and organizations face financial constraints, it can be tempting to cut corners…

Cyber Attack on NATO and Ransomware Attack on Motel One
19
Oct
2023

Maritime Companies Increasingly Paying Ransoms Amidst Ransomware Surge

In the double extortion strategy, cybercriminals first exfiltrate sensitive data from the victim’s servers and then encrypt the data, making…

Interesting cyber attack headlines trending on Google for this day
19
Oct
2023

Interesting cyber attack headlines trending on Google for this day

“Ukraine Cyber Alliance Takes Down Trigona Ransomware Gang, Wipes Their Data Clean” In recent times, we’ve witnessed numerous headlines about…

How 5G Technology Accelerates Cybersecurity
18
Oct
2023

Cyber attack on payment systems could cost $3.5 trillion loss to the world

Have you ever contemplated the potential ramifications of a highly sophisticated cyberattack targeting global payment systems? Lloyds of London, a…

Now electric charging stations are vulnerable to hackers after public USB charging points
18
Oct
2023

Trending cyber attack related news headlines on Google

IBM confirms Johnson & Johnson Data Breach with 631k affected IBM has officially confirmed a data breach involving Johnson &…

How Turning Off Bluetooth Can Safeguard Your Mobile from Cyber Attacks
18
Oct
2023

How Turning Off Bluetooth Can Safeguard Your Mobile from Cyber Attacks

In today’s interconnected world, our smartphones have become central to our lives. We rely on them for communication, navigation, entertainment,…

Key Considerations When Hiring a Chief Information Security Officer
17
Oct
2023

Ten 10 essential tips to bolster information security

In today’s business landscape, information security is of paramount importance. With nearly all business operations going digital, companies are increasingly…

All Gmail Personal Accounts to get passkey login security as default
17
Oct
2023

All Gmail Personal Accounts to get passkey login security as default

Starting early next year, specifically from January 16, 2024, Google is set to revolutionize its online services by making passkey…

Preparing Digital Identity for the Post-Quantum Era
16
Oct
2023

Preparing Digital Identity for the Post-Quantum Era

[ This article was originally published here ] In our previous blog we discussed the emerging technology that is quantum…

CISOs witness meagre salary rise and bonuses in 2023
16
Oct
2023

CISOs witness meagre salary rise and bonuses in 2023

As 2023 draws to a close, many Chief Information Security Officers (CISOs) find themselves at the crossroads of salary negotiations…