Home Tags Cybersecurity

Tag: cybersecurity

Data Protection Sustainability: A Self-compensating System

0
How substantial is cybersecurity compliance to engendering reliability in data protection processes? While we may defer answering this question, the importance placed on cybersecurity...

G7 Nations Sign Declaration to Improve Online Safety

0
G7 nations have signed a new ministerial declaration to enhance online safety and security worldwide. The digital and technology ministers from the U.K., Canada,...

Ransomware Task Force Issues Framework to Combat Ransomware Attacks

0
Combating rising ransomware attacks has become a challenge for organizations globally. Several ransomware groups are targeting companies by encrypting their systems, paralyzing operations, and...

Supply Chain Security – A CISO Point of View

0
Recent news about the SolarWinds compromise and Trojan horse introduced in their software raises a question: How can organizations ensure the security of their...

Darkside Ransomware Gang Adopts New Extortion Technique by Targeting Stock Traders

0
Cybercriminals often try innovative methods in their attacking techniques to increase their success rate and evade security detection (obfuscation). From new malware variants to...

Think Before You Scan! Malicious QR Codes in the Wild

0
Since the outbreak of the COVID-19 pandemic, people across the globe have encountered dramatic changes in their daily lives. From the way we used...

Leveraging Security Psychology to Mitigate Cybersecurity Risk

0
Problem Statement: Human risk is real, and information and cybersecurity awareness trainings are not assuring and adequate. Period. Often security trainings are compliance-focused, as against...

U.S. Space Command to Launch New Cyber Center for Better Cyber...

0
Cybersecurity is a critical element for the smooth functioning of a business. Having the right security solution works wonders for an IT architecture for...

Ransom Mafia Extort Money By Forming Ransomware Cartels

0
The adage “Apes Together Strong,” denotes apes working together for a common goal that would eventually benefit them. Similarly, several cybercriminal groups join hands...

In IT Security, All Roads Lead to Identity

0
The increasing use of cloud services and automation solutions or even the switch to remote work has made identity the new perimeter security. With...

MOST POPULAR

RECENT POSTS