Category: CyberSecurity-Insiders

Naveen Goud
20
Jun
2024

Now a Doctrine for Cyberspace Operations

Have you ever heard of a Doctrine meant to formulate cyber space operations? Well, here’s a news piece that might…

Jane Devry
20
Jun
2024

Internet Computer Protocol Launches Walletless Verified Credentials to Build Trust in the Public Discourse

Internet Computer Protocol (ICP), a decentralized blockchain network that extends the functionality of Web3 by overcoming the limitations of traditional…

Jane Devry
20
Jun
2024

A New Age of Threats in Online Shopping: Cybersecurity Tips

The rise in online shopping brings more than just the ease of overnight shipping and competitive pricing – it also…

Jane Devry
20
Jun
2024

Did ‘Terraform Destroy’ Cause the UniSuper Google Cloud Outage?

In early May, the internet was rocked by news of Google supposedly deleting a pension fund account worth $125 billion….

Jane Devry
20
Jun
2024

Securing Our Water Supply: Cybersecurity Strategies for Treatment Plants

The recent cyberattacks affecting water treatment plants and systems across the nation shed light on the need for cybersecurity measures…

Jane Devry
20
Jun
2024

Four Steps to Improving Your Organization’s Cyber Resilience

The question is not ‘if’ your organization will face a cybersecurity threat but ‘when.’ The bad news gets worse: suffering…

Naveen Goud
20
Jun
2024

Update on ransomware attacks on NHS, AMD and CDK Global

1.) Recently, the Qilin ransomware group, believed to originate from Russia, targeted three hospitals and a network, severely disrupting emergency…

Jane Devry
19
Jun
2024

Better Protect Your Cybersecurity During Hurricane Season

Threat actors don’t just seek out security weaknesses. They look for situational vulnerabilities. Every holiday season, for instance, they come…

Jane Devry
19
Jun
2024

The developers’ guide to secure coding: The six steps towards secure software development

Software is the heart of our connected world, but as its importance grows, so do cyber threats. According to the…

Jane Devry
19
Jun
2024

Cyborg Social Engineering: Defending against personalised attacks

Generative AI has the potential to make social engineering attacks much more sophisticated and personalised. The technology can rapidly mine…

Naveen Goud
19
Jun
2024

Google find my device helps secure your information stored on the phone to the core

Recently, many Android phone users may have received emails about the activation and use of the ‘Find My Device’ feature….

Jane Devry
19
Jun
2024

SME Cybersecurity Challenges and Opportunities

Small and Medium Size Enterprises (SMEs) are a major driver of the U.S. economy, representing as much as one-third of…