Category: CyberSecurity-Insiders

Google limits internet access to employees to save them from Cyber Attacks
14
Aug
2023

Types of Cyber Attacks Every Online User Should Be Aware Of

In today’s digital age, where our lives are intertwined with the virtual world, cybersecurity has become a paramount concern. The…

Encryptionless Ransomware Attacks and Defense Strategies: An Interview with Zscaler’s Deepen Desai
12
Aug
2023

Encryptionless Ransomware Attacks and Defense Strategies: An Interview with Zscaler’s Deepen Desai

In a recent interview with Deepen Desai, Global CISO and Head of Security Research at Zscaler, we discussed the evolving…

Ransomware in 2023: Emerging Threats, New Targets, and How Organizations Can Protect Themselves
12
Aug
2023

Ransomware in 2023: Emerging Threats, New Targets, and How Organizations Can Protect Themselves

by Avishai Avivi, CISO, SafeBreach  From small attacks to mass hacks, ransomware groups continue to wreak havoc in 2023, attacking…

How social media compromises information security
11
Aug
2023

Image steganography: Concealing secrets within pixels

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Data Security firm Imperva to be acquired by Thales for $3.5 billion
11
Aug
2023

Google Cloud launched Chronicle Cybershield

Amid the growing challenges posed by advanced cyber threats, Google Cloud has introduced “Chronicle Cybershield,” a solution aimed at bolstering…

Google limits internet access to employees to save them from Cyber Attacks
11
Aug
2023

Connecticut school loses millions in Spoofing Cyber Attack

A sophisticated cyber attack orchestrated by unidentified cyber criminals has resulted in the unlawful acquisition of $6 million from a…

How to Draft an Effective Data Protection Strategy
11
Aug
2023

Ensuring HIPAA Compliance on Mobile Devices: A Vital Guide

In today’s digital age, where mobile devices have become an integral part of healthcare delivery and patient management, maintaining the…

Reshaping the API Security Landscape: Graylog Acquires Resurface
11
Aug
2023

Reshaping the API Security Landscape: Graylog Acquires Resurface

In the world of cybersecurity, change is the only constant. This reality is once again affirmed in a recent interview…

The Future of Cloud-Native Data Security: A Look at Laminar's New Capabilities
10
Aug
2023

The Future of Cloud-Native Data Security: A Look at Laminar’s New Capabilities

Recently, we sat down with Andy Smith, Chief Marketing Officer at Laminar, a leading agile data security platform provider, for…

Zoom using user data to train its AI models
10
Aug
2023

Zoom using user data to train its AI models

Zoom, the widely used video conferencing application prominent in corporate circles, has made a public announcement concerning its intention to…

Norway first to put daily penalty on Meta over data security concerns
10
Aug
2023

Norway first to put daily penalty on Meta over data security concerns

Norway’s data protection authority, Datatilsynet, has revealed that it is imposing a daily fine of $100,000 on Meta, the parent…

How social media compromises information security
10
Aug
2023

Mind the (Interpretation) gap: Another reason why threat modeling is important

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …