Category: CyberSecurity-Insiders

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)
19
Sep
2023

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)

With autumn leaves falling and September firmly underway, the time has come to note and reflect on National Insider Threat…

Unofficial digital IDs – what are the risks?
19
Sep
2023

Unofficial digital IDs – what are the risks?

[ This article was originally published here ] Digital identification has rapidly become an integral part of our day-to-day lives,…

How social media compromises information security
19
Sep
2023

From one realm to another: Ensuring data protection in a cloud migration

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Microsoft 38TB AI Data Leak details
19
Sep
2023

Microsoft 38TB AI Data Leak details

In July 2020, Microsoft (MS) launched its dedicated Artificial Intelligence (AI) research division, initially envisioned to harness vast datasets for…

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)
19
Sep
2023

Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)

With autumn leaves falling and September firmly underway, the time has come to note and reflect on National Insider Threat…

Submarine Cables vulnerable to Cyber Attacks
19
Sep
2023

Cloud environments blamed for security vulnerabilities

Fascinating research carried out by Palo Alto Networks Unit 42 has unveiled that a staggering 80% of organizations point the…

2024 Cybersecurity Excellence Awards Now Open
18
Sep
2023

2024 Cybersecurity Excellence Awards Now Open

The 2024 CYBERSECURITY EXCELLENCE AWARDS are now open for nominations. In the complex and dynamic world of cybersecurity, excellence often…

PRODUCT REVIEW: ISC2 CGRC Certification
18
Sep
2023

PRODUCT REVIEW: ISC2 CGRC Certification

The demand for governance, risk, and compliance (GRC) professionals is on the rise due to increasing regulatory requirements, the constantly…

How social media compromises information security
18
Sep
2023

Unmasking antiforensics techniques: Strategies for effective defense

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

How to protect mobile phone from malware attacks
18
Sep
2023

Scattered Spider managed MGM Resort Network Outage brings $8m loss daily

In recent weeks, Scattered Spider, a highly active hacking group, has made headlines by targeting more than 130 organizations, with…

TikTok slapped with €345m Child Privacy penalty by EU
18
Sep
2023

TikTok slapped with €345m Child Privacy penalty by EU

The European Union has imposed a substantial €345 million fine on the popular video-sharing platform TikTok for its failure to…

Rolls Royce targeted in a sophisticated Cyber Attack with potential Data Breach
18
Sep
2023

Top 5 Search Engines for Cybersecurity Research

In the ever-evolving landscape of cybersecurity, staying updated with the latest threats, vulnerabilities, and research findings is crucial. One of…