Category: CyberSecurity-Insiders

Microsoft and Samsung launch Advanced Mobile Security Solution
20
Sep
2023

Mobile security challenges in work from home environments

In recent years, the global workforce has witnessed a significant shift towards remote work, catalyzed by the COVID-19 pandemic. This…

Enea Unveils Qosmos Threat Detection SDK to Boost Network Security
19
Sep
2023

Enea Unveils Qosmos Threat Detection SDK to Boost Network Security

As the networking landscape rapidly shifts with data, applications, and infrastructure migrating to the cloud, Enea, a leader in telecom…

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)
19
Sep
2023

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)

With autumn leaves falling and September firmly underway, the time has come to note and reflect on National Insider Threat…

Unofficial digital IDs – what are the risks?
19
Sep
2023

Unofficial digital IDs – what are the risks?

[ This article was originally published here ] Digital identification has rapidly become an integral part of our day-to-day lives,…

How social media compromises information security
19
Sep
2023

From one realm to another: Ensuring data protection in a cloud migration

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Microsoft 38TB AI Data Leak details
19
Sep
2023

Microsoft 38TB AI Data Leak details

In July 2020, Microsoft (MS) launched its dedicated Artificial Intelligence (AI) research division, initially envisioned to harness vast datasets for…

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)
19
Sep
2023

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)

With autumn leaves falling and September firmly underway, the time has come to note and reflect on National Insider Threat…

Submarine Cables vulnerable to Cyber Attacks
19
Sep
2023

Cloud environments blamed for security vulnerabilities

Fascinating research carried out by Palo Alto Networks Unit 42 has unveiled that a staggering 80% of organizations point the…

2024 Cybersecurity Excellence Awards Now Open
18
Sep
2023

2024 Cybersecurity Excellence Awards Now Open

The 2024 CYBERSECURITY EXCELLENCE AWARDS are now open for nominations. In the complex and dynamic world of cybersecurity, excellence often…

PRODUCT REVIEW: ISC2 CGRC Certification
18
Sep
2023

PRODUCT REVIEW: ISC2 CGRC Certification

The demand for governance, risk, and compliance (GRC) professionals is on the rise due to increasing regulatory requirements, the constantly…

How social media compromises information security
18
Sep
2023

Unmasking antiforensics techniques: Strategies for effective defense

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

How to protect mobile phone from malware attacks
18
Sep
2023

Scattered Spider managed MGM Resort Network Outage brings $8m loss daily

In recent weeks, Scattered Spider, a highly active hacking group, has made headlines by targeting more than 130 organizations, with…