Category: CyberSecurity-Insiders

The most effective cybersecurity awareness training is personalized
02
Mar
2023

The most effective cybersecurity awareness training is personalized

By Matt Lindley, COO and CISO at As cyberattacks become increasingly frequent and destructive, cybersecurity education is no longer optional….

What’s Driving the Demand for GRC Professionals in Critical Infrastructure?
02
Mar
2023

What’s Driving the Demand for GRC Professionals in Critical Infrastructure?

[ This article was originally published here ] As geopolitical tensions continue, cyberwarfare has taken its toll on the world….

8 Common Cybersecurity issues when purchasing real estate online: and how to handle them
02
Mar
2023

8 Common Cybersecurity issues when purchasing real estate online: and how to handle them

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Cyber Attack news headlines trending on Google
02
Mar
2023

Cyber Attack news headlines trending on Google

WH Smith, United Kingdom’s most popular bookseller and stationary seller has become a target of a cyber attack that led…

Law firms facing malware cyber threat
02
Mar
2023

Law firms facing malware cyber threat

From early this year, two malware variants targeted almost 6-7 law firms spread through two separate incidents, alerting whole of…

Belgium admits China hackers behind the attack on European Government MP  
01
Mar
2023

Belgium admits China hackers behind the attack on European Government MP  

Belgium government has made an official announcement that Beijing launched cyber-attacks on a prominent MP of the nation and tagged…

(ISC)² Members Reveal Deep Skepticism About Artificial Intelligence and Machine Learning
01
Mar
2023

(ISC)² Members Reveal Deep Skepticism About Artificial Intelligence and Machine Learning

[ This article was originally published here ] By John E. Dunn  It’s little surprise that many people are skeptical…

Third party Cybersecurity risks in securing the supply chain
01
Mar
2023

Third party Cybersecurity risks in securing the supply chain

[ This article was originally published here ] Some of the biggest prevailing challenges in the cybersecurity world over the…

LastPass becomes a cyber attack victim for the second time from the first time
01
Mar
2023

LastPass becomes a cyber attack victim for the second time from the first time

It is a well-known fact that those spreading malware like ransomware strike the same victim twice, if/when the victim shows…

Crypto Scammers Game YouTube for Amplification While Keeping Under Radar, Researchers Find
01
Mar
2023

Crypto Scammers Game YouTube for Amplification While Keeping Under Radar, Researchers Find

[ This article was originally published here ] By Joe Fay Not even a pyramid scheme – they just convince…

The Bridge to Zero Trust
28
Feb
2023

The Bridge to Zero Trust

No one likes to think their company might be hit by a cyber attack or breach, but the truth is…

Apple iPhone Vulnerability let hackers steal photos, messages and files
28
Feb
2023

Apple iPhone Vulnerability let hackers steal photos, messages and files

Apple Inc has issued an update that it will soon release the fix to the two newly discovered vulnerabilities that…