In 2022, the Security team at Microsoft published a cybersecurity awareness campaign named “# BeCyberSmart ”. Even though that was two years ago, the same best practices still apply. Cybersecurity is an important part of our daily lives and can…
Category: Blog RSS Feed
Why Is Cyber Resilience Essential and Who’s Responsible for It?
In the first installment of our series on cyber resilience, we discussed what being a resilient organization means. In this installment, we’ll explore why organizations need to consider how to become resilient, who’s responsible for achieving this, and the processes…
Ensuring Privacy in the Age of AI: Exploring Solutions for Data Security and Anonymity in AI
With the widespread use of AI technology, numerous AI models gather and process vast amounts of data, much of which comprises personal information utilized to offer personalized experiences. However, this abundance of data poses inherent risks, particularly in terms of…
The Impact of NIST SP 800-171 on SMBs
From more broad laws like GDPR to industry-specific regulations like HIPAA , most organizations today must comply with some kind of data protection guideline. Some businesses may even have to comply with numerous data protection regulations. As such, compliance with…
Vulnerability Scanning vs. Penetration Testing
In the modern digital landscape, cybersecurity is paramount, making the differentiation between vulnerability scanning and penetration testing essential for safeguarding organizational assets. Vulnerability scanning offers a broad sweep for potential security weaknesses, serving as an early warning system. Penetration testing…
Cybersecurity: The Battle of Wits
With cybersecurity, the digital battlegrounds stretch across the vast expanse of the internet. On the one side, we have increasingly sophisticated and cunning adversaries. On the other, skilled cybersecurity practitioners who are desperate to protect their companies’ assets at all…
Tripwire Patch Priority Index for April 2024
Tripwire’s April 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. Firsts on the list are patches for Microsoft Edge (Chromium-based) and Chromium that resolve 2 spoofing vulnerabilities. Next on the patch priority list this month is a…
DMARC – The Next Step in Email Hygiene and Security
In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA) . This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring…
Defending Against Supply Chain Spoofing in Critical Manufacturing
Supply chain attacks are a serious and growing threat to businesses across all industries. However, these attacks pose an even greater risk for manufacturers in critical infrastructure sectors. One pernicious form of supply chain attack is spoofing, where attackers impersonate…
10 Database Security Best Practices You Should Know
Statista shows a near doubling of data compromises between last year (3,205) and the year before (1,802). Cybercriminals go where the data goes, and there is more need than ever for effective database security measures. These tactics differ from network…
Machines vs Minds: The Power of Human Ingenuity Against Cyber Threats
Most people remember the iconic movie Terminator, in which the cyborg T-800 was dispatched back in time from the year 2029 with the mission to eliminate Sarah Connor. She was destined to give birth to the future leader of the…
“Junk gun” ransomware: the cheap new threat to small businesses
What’s going on? A wave of cheap, crude, amateurish ransomware has been spotted on the dark web – and although it may not make as many headlines as LockBit , Rhysida , and BlackSuit , it still presents a serious…
“All for One and One for All”: The EU Cyber Solidarity Act Strengthens Digital Defenses
Alexandre Dumas’s timeless novel “The Three Musketeers” immortalized the ideal of unyielding solidarity, the enduring motto “All for one and one for all.” In the face of ever-evolving threats in the digital realm, the European Union echoes this spirit with…
UK IT Leaders Are Prioritizing Cybersecurity: But Is This a Good Thing?
Tech leaders taking cybersecurity seriously is something of a double-edged sword. While it’s undoubtedly good that organizations are waking up to the genuine threat cyberattacks pose, it’s depressing that they must siphon off so many resources to protect themselves rather…
University Cybersecurity Clinics Can Now Use the New CISA Resource Guide
Budgetary and resource constraints play a huge role in cyberattacks on smaller organizations. Amidst a strained global economy, many under-resourced organizations like non-profits, local governments, and hospitals struggle to keep their heads above water – they simply don’t have the…
Enhancing Endpoint Security with Advanced Host-Based Intrusion Detection Capabilities
In 2023, companies lost about $4.45 million on average because of data breaches. As cyber threats advance, securing endpoints is more important than ever. An advanced Host-based Intrusion Detection System (HIDS) provides a sturdy remedy to improve endpoint security .…
Exploring Cybersecurity Risks in Telemedicine: A New Healthcare Paradigm
The experience of seeing a doctor has transformed dramatically, thanks in part to the emergence of telemedicine. This digital evolution promises convenience and accessibility but brings with it a host of cybersecurity risks that were unimaginable up until a few…
NSA Debuts Top 10 Cloud Security Mitigation Strategies
As businesses transition to hybrid and multi-cloud setups, vulnerabilities arising from misconfigurations and security gaps are escalating, attracting attention from bad actors. In response, the US National Security Agency (NSA) issued a set of ten recommended mitigation strategies, published earlier…
37 Arrested as Police Smash LabHost International Fraud Network
Police have successfully infiltrated and disrupted the fraud platform “LabHost”, used by more than 2,000 criminals to defraud victims worldwide. A major international operation, led by the UK’s Metropolitan Police, has seized control of LabHost, which has been helping cybercriminals…
Supply Chain Cybersecurity – the importance of everyone
I’m always surprised – and a little disappointed – at how far we have to go before supply chain cybersecurity gets the respect and attention it deserves. I sat down this week with a new client who wanted some help…