Category: CyberSecurity-Insiders

TikTok hires British Security firm to banish data security concerns
05
Sep
2023

TikTok hires British Security firm to banish data security concerns

Since 2018, TikTok, the Chinese-based video-sharing platform, has faced relentless criticism over its alleged mishandling of data security. Initially, the…

The Nuanced Landscape of Insider Threats: A Conversation with Federico Charosky of Quorum Cyber
05
Sep
2023

The Nuanced Landscape of Insider Threats: A Conversation with Federico Charosky of Quorum Cyber

In a recent interview, Federico Charosky, CEO of Quorum Cyber, shed light on some often-underappreciated yet crucial facets of insider…

Microsoft and Samsung launch Advanced Mobile Security Solution
05
Sep
2023

Avoid storing this data on mobile to curb privacy and security concerns

To mitigate privacy and security concerns, it’s advisable to refrain from storing certain types of data on your mobile devices….

LockBit hackers steal sensitive documents from Britain Military Defense
04
Sep
2023

LockBit hackers steal sensitive documents from Britain Military Defense

The United Kingdom’s Ministry of Defense has once again found itself in the spotlight due to a recent cyberattack, with…

Germany witnesses $224Bn yearly economy loss with Cyber Attacks
04
Sep
2023

Germany witnesses $224Bn yearly economy loss with Cyber Attacks

In recent times, many developed nations such as the United States, the United Kingdom, Canada, and Australia have refrained from…

How malware sandboxes can help strengthen cybersecurity
04
Sep
2023

How malware sandboxes can help strengthen cybersecurity

In the ever-evolving landscape of cybersecurity, the battle between cyber-criminals and defenders rages on. Cyberattacks are becoming more sophisticated and…

Preparing for the Future: Understanding Identity’s Role in Data Security
01
Sep
2023

Preparing for the Future: Understanding Identity’s Role in Data Security

By Gal Helemski, Co-Founder and CTO/CPO at PlainID “Data is the lifeblood of an organization.” Becoming somewhat of a platitude…

Hackers infiltrate servers of Japanese Government Cybersecurity Agency
01
Sep
2023

Hackers infiltrate servers of Japanese Government Cybersecurity Agency

In a concerning turn of events, the servers of Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC)…

Anonymous Sudan launched Cyber Attack on X formerly Twitter
01
Sep
2023

Anonymous Sudan launched Cyber Attack on X formerly Twitter

In a digital age where the lines between activism and hacking are increasingly blurred, Anonymous Sudan, a self-proclaimed hacktivist group…

How to obtain cyber resilience in low security budgets
01
Sep
2023

How to obtain cyber resilience in low security budgets

In the contemporary digital environment, the specter of cyberattacks casts a shadow over organizations of every scale. Despite the essential…

Deploying AI Code: Safety Goggles Needed
31
Aug
2023

Deploying AI Code: Safety Goggles Needed

Pieter Adieux Co-Founder and CEO, Secure Code Warrior The possibilities of generative AI (GAI) technology have had both developers and…

Assessing Generative AI’s Impact on Cyber Risk
31
Aug
2023

Assessing Generative AI’s Impact on Cyber Risk

By David Hoelzer, Fellow at The SANS Institute The rise of ChatGPT and generative AI has ushered in an extensive…