How To Ensure Information Security of An Organization Basing on Business Requirements
07
Oct
2023

How To Ensure Information Security of An Organization Basing on Business Requirements

By Sergio Bertoni, The Leading Analyst at SearchInform There is a global trend of strengthening the legislation related to the…

The Basics of Digital Forensics
07
Oct
2023

The Basics of Digital Forensics

By Milica D. Djekic The digital forensics is a field that assists us to find the clues within a cyberspace…

The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech
07
Oct
2023

The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech

By Craig Burland,CISO of Inversion6 The default mental image of a 1970’s Ford Pinto shows a car ablaze with the…

Cyber Insurance and SOC as a Service – Adapting to New Cybersecurity Challenges
07
Oct
2023

Cyber Insurance and SOC as a Service – Adapting to New Cybersecurity Challenges

In the modern digital landscape, organizations face an ever-increasing barrage of cyber threats. Cybercriminals continually adapt their tactics, making it…

Foundational Security is the Enterprise’s Weakest Link
07
Oct
2023

Foundational Security is the Enterprise’s Weakest Link

By Mike Greene, CEO, Enzoic Companies are evaluating artificial intelligence and other emerging technologies to combat cyber threats, with IDC…

Facebook's Official Page Hacked; Demand Release of Pakistani PM Imran Khan
07
Oct
2023

Facebook’s Official Page Hacked; Demand Release of Pakistani PM Imran Khan

Facebook’s official page was hacked on Facebook after bizarre posts, including demands for the release of ex-Pakistani PM Imran Khan,…

Amazon Prime email scammer snatches defeat from the jaws of victory
07
Oct
2023

Amazon Prime email scammer snatches defeat from the jaws of victory

A very convincing Amazon Prime scam landed in our mail server today and…went straight to spam. Here’s why. More often…

QakBot threat actors are still operational after the August takedown
07
Oct
2023

QakBot threat actors are still operational after the August takedown

QakBot threat actors are still operational after the August takedown Pierluigi Paganini October 07, 2023 Threat actors behind the QakBot…

Snatch Ransomware Group Claims The FDVA Cyber Attack
07
Oct
2023

Why It’s More Important Than Ever

Chief Executive Officers (CEOs) across the globe recognize the crucial role cybersecurity plays in their companies’ growth and stability, with…

Spotlight on Injection
07
Oct
2023

Spotlight on Injection

Welcome to the 12th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a…

Apple's Encryption Is Under Attack by a Mysterious Group
07
Oct
2023

Apple’s Encryption Is Under Attack by a Mysterious Group

Does the public have a right to see gruesome photos of animal test subjects taken by a public university? That…

Multi-factor authentication has proven it works, so what are we waiting for?
07
Oct
2023

Multi-factor authentication has proven it works, so what are we waiting for?

Amazon has announced it will require all privileged AWS to use MFA in the near future. Let’s hope others follow….