Category: CyberSecurity-Insiders

WhatsApp introduces new mobile security features
17
Apr
2023

WhatsApp introduces new mobile security features

WhatsApp, owned by Facebook, has introduced three new account protection features to enhance the security and privacy of its users,…

How reliable are Cloud based Security solutions
17
Apr
2023

How reliable are Cloud based Security solutions

Cloud-based security solutions have become increasingly popular in recent years, as more and more businesses are moving their operations to…

PCI DSS reporting details to ensure when contracting quarterly CDE tests
15
Apr
2023

PCI DSS reporting details to ensure when contracting quarterly CDE tests

[ This article was originally published here ] This is the second blog in the series focused on PCI DSS,…

Most of US IT professionals asked to stay silent about data breaches
14
Apr
2023

Most of US IT professionals asked to stay silent about data breaches

Data breach reporting is mandatory and, as per some prevailing laws, any incident that goes unreported for a while can…

Over 12k Indian Govt websites disrupted due to cyber-attack from Indonesia
14
Apr
2023

Over 12k Indian Govt websites disrupted due to cyber-attack from Indonesia

Cyber attacks on public websites have become an increasing concern for governments across the world, and this article is related…

The Security Risks of ChatGPT in an Enterprise Environment
14
Apr
2023

The Security Risks of ChatGPT in an Enterprise Environment

As artificial intelligence (AI) technologies become more prevalent in enterprise environments, chatbots like ChatGPT are gaining popularity due to their…

(ISC)² Security Congress in Nashville – See Y’all There!
13
Apr
2023

(ISC)² Security Congress in Nashville – See Y’all There!

[ This article was originally published here ] We are less than 200 days away from the . Our team…

Cloud forensics - An introduction to investigating security incidents in AWS, Azure and GCP
13
Apr
2023

Cloud forensics – An introduction to investigating security incidents in AWS, Azure and GCP

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Cyber Attack news headlines trending on Google
13
Apr
2023

Cyber Attack news headlines trending on Google

First is the news related to Kodi Media Player software as a hacker is claiming to have accessed and stolen…

Quantum Computing Threats: A How-to Guide for Preparing Your Company's Cybersecurity Defenses
13
Apr
2023

Quantum Computing Threats: A How-to Guide for Preparing Your Company’s Cybersecurity Defenses

Quantum computing, while still in its infancy, is developing rapidly and holds tremendous potential for solving complex computational problems. However,…

Twitter works on secret AI project in contradiction to sayings of owner Elon Musk
13
Apr
2023

Twitter works on secret AI project in contradiction to sayings of owner Elon Musk

For the past few months, Elon Musk, the current owner of Twitter, has urged AI-based firms to pause their R&D…

Top Gun and Zero Trust: Lessons in Cybersecurity for the CISO and CIO
12
Apr
2023

Top Gun and Zero Trust: Lessons in Cybersecurity for the CISO and CIO

By Jaye Tillson, Director of Strategy, The iconic 1986 film “Top Gun” is one of my favorite films. In the…