Category: CyberSecurity-Insiders

Cybersecurity horror stories and how to avoid them
13
Nov
2023

Cybersecurity horror stories and how to avoid them

By Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity 2023 has seen a host of malicious cyber-attacks targeting a range…

Cyber Attack on NATO and Ransomware Attack on Motel One
13
Nov
2023

Enhancing Ransomware Defense through Micro-Segmentation of Networks

In an era where cyber threats continue to evolve in sophistication, organizations are increasingly turning to advanced security measures to…

Norway first to put daily penalty on Meta over data security concerns
13
Nov
2023

DP World Cyber Attack puts Australia on High Alert

Over the recent weekend, DP World Australia, a prominent maritime freight operator, fell victim to a sophisticated digital attack, prompting…

It’s Never Too Soon to Begin Thinking About Your 2024 Cybersecurity Journey
10
Nov
2023

It’s Never Too Soon to Begin Thinking About Your 2024 Cybersecurity Journey

John Siegel, Director of Strategy, Field CTO, Axis Security Was it me, or did 2023 roll by fast? It feels like it…

Google limits internet access to employees to save them from Cyber Attacks
10
Nov
2023

Cyber Attack news headlines trending on Google

The Washington State Transportation website and its mobile app experienced a disruption due to a sophisticated cyber attack earlier this…

How the AI era has fundamentally altered the cyberthreat landscape
10
Nov
2023

How the AI era has fundamentally altered the cyberthreat landscape

By Matt Lindley, COO and CISO at NINJIO The AI mania over the past year has been illuminating in many…

A Deep Dive into Ransomware History: From Its Origins to Modern Threats
10
Nov
2023

Cyber Attack on US Bank forces it to transit data via USB Sticks

In a world plagued by numerous cyberattacks and their devastating aftermath, a recent incident involving the Industrial & Commercial Bank…

Key Considerations When Hiring a Chief Information Security Officer
10
Nov
2023

What is a diamond model of Intrusion Analysis

The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion…

Why you need ZTNA with Desktops-as-a-Service
09
Nov
2023

Why you need ZTNA with Desktops-as-a-Service

By Karen Gondoly, CEO of Leostream As the world increasingly works remotely, Desktops as a Service (DaaS) are becoming ubiquitous…

Eight Ways to Bolster Your Cybersecurity Resources Without Blowing Your Budget
09
Nov
2023

Eight Ways to Bolster Your Cybersecurity Resources Without Blowing Your Budget

By Karen Lambrechts, Lansweeper IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a…

Is Microsoft ChatGPT grappling with DDoS Cyber Attack
09
Nov
2023

Is Microsoft ChatGPT grappling with DDoS Cyber Attack

In recent days, Microsoft’s generative AI tool, ChatGPT, has been experiencing connectivity problems. The official message on the website indicates…

How can a CEO or a CTO lose their jobs on ransomware attacks
09
Nov
2023

How can a CEO or a CTO lose their jobs on ransomware attacks

In accordance with the newly introduced federal guidelines, the responsibility for a company facing a ransomware attack is now placed…