Generative AI – an early adopter’s experience
06
Feb
2024

Generative AI – an early adopter’s experience

Thank you for joining! Access your Pro+ Content below. 6 February 2024 Generative AI – an early adopter’s experience Share…

Snatch Ransomware Group Claims The FDVA Cyber Attack
06
Feb
2024

Data Breach Claims On Dark Web

A recent Maxis Berhad cyberattack has been attributed to the R00TK1T ISC Cyber Team, stirring concerns about data security and…

HPE is investigating claims of a new security breach
06
Feb
2024

HPE is investigating claims of a new security breach

HPE is investigating claims of a new security breach Pierluigi Paganini February 06, 2024 Hewlett Packard Enterprise (HPE) is investigating…

3 New Risks That CISOs Will Face in 2024
06
Feb
2024

3 New Risks That CISOs Will Face in 2024

By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere…

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
06
Feb
2024

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance

Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech…

3 ways to achieve crypto agility in a post-quantum world
06
Feb
2024

3 ways to achieve crypto agility in a post-quantum world

Working at the speed of digital business is a constant challenge. But in today’s increasingly automated operational environment, crypto agility—i.e.,…

United Colors of Benetton Data Breach
06
Feb
2024

Claims Of United Colors Of Benetton Data Breach Surface

A threat actor known as ‘IC3’ has released sensitive databases from well-known global entities—United Colors of Benetton (India), Watchmax (UK),…

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
06
Feb
2024

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments

By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits…

Top 10 Ways to Avoid Cybersecurity Misconfigurations
06
Feb
2024

Five 5 benefits of having a cyber insurance cover on hand

In the age of digitization, securing IT assets through insurance coverage presents a challenge, particularly in convincing board members to…

How CISOs navigate policies and access across enterprises
06
Feb
2024

How CISOs navigate policies and access across enterprises

In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection…

Illegal Spyware Surveillance
06
Feb
2024

U.S. Imposes Visa Restrictions on those Involved in Illegal Spyware Surveillance

Feb 06, 2024NewsroomSurveillance / Privacy The U.S. State Department said it’s implementing a new policy that imposes visa restrictions on…

Hackers Selling AnyDesk Users' Login Credentials
06
Feb
2024

Hackers Selling AnyDesk Users’ Login Credentials

A recent security breach has exposed AnyDesk’s customer’s credentials, putting their accounts and devices at risk.  On February 3, 2024,…