By Lisa Levy at Satori, the Data Security Platform As forward-thinking CIOs are well aware, the success of business process digitalization is intimately tied to the backbone of any digital endeavor: data. But it’s not just about having vast amounts…
Category: Cybersecurity Insiders
Reading between the Lines – How the INFORM Consumers Act Impacts Online Retailers
By Erik Gaston, Vice President of Global Executive Engagement, Tanium Cyber-criminals are nothing if not opportunistic. While the e-commerce industry is far from the “Wild, Wild West” – where infamous masked highway robbers ganged-up and ran rampant – today’s outlaws…
Introducing the next phase of 5G
It’s been over four years since 5G was introduced and the technology has now been rolled out across all the world’s major economies. So, we’re starting to think about what’s coming next…. Expansion into emerging markets With 5G already embedded…
Future forward cyber
For organizations of all sizes, cyber consistently earns a place on the agenda, becoming a focal point for business-critical initiatives and investments. Today, cyber means business, and it isn’t challenging to overstate the importance of cyber as a foundational and…
Holiday Season Cyber Alert: Reflectiz Declares War on Magecart Attacks
Reflectiz, a cybersecurity company specializing in continuous web threat management offers an exclusive, fully remote solution to battle Magecart web-skimming attacks, a popular type of cyberattacks involving injecting malicious code into the checkout pages. As the Holiday Season approaches, online…
TikTok hires British Security firm to banish data security concerns
Since 2018, TikTok, the Chinese-based video-sharing platform, has faced relentless criticism over its alleged mishandling of data security. Initially, the United States banned the app’s use on all government-issued phones, setting off a domino effect that led to similar actions…
The Nuanced Landscape of Insider Threats: A Conversation with Federico Charosky of Quorum Cyber
In a recent interview, Federico Charosky, CEO of Quorum Cyber, shed light on some often-underappreciated yet crucial facets of insider risk in cybersecurity. Charosky emphasizes the necessity of nuanced definitions when discussing the topic of insider risk. He argues that…
Avoid storing this data on mobile to curb privacy and security concerns
To mitigate privacy and security concerns, it’s advisable to refrain from storing certain types of data on your mobile devices. While smartphones are indispensable for staying connected and managing various aspects of our lives, safeguarding personal information should be a…
LockBit hackers steal sensitive documents from Britain Military Defense
The United Kingdom’s Ministry of Defense has once again found itself in the spotlight due to a recent cyberattack, with fingers of suspicion pointing towards Russian hackers. While there is no conclusive evidence to substantiate these claims, there is a…
How malware sandboxes can help strengthen cybersecurity
In the ever-evolving landscape of cybersecurity, the battle between cyber-criminals and defenders rages on. Cyberattacks are becoming more sophisticated and harder to detect, making it imperative for organizations to bolster their defenses. One powerful weapon in the cybersecurity arsenal is…
Germany witnesses $224Bn yearly economy loss with Cyber Attacks
In recent times, many developed nations such as the United States, the United Kingdom, Canada, and Australia have refrained from publicly identifying their cyber adversaries, understanding that doing so might inadvertently provide these adversaries with a significant advantage on the…
The SEC demands more transparency about Cybersecurity incidents in public companies
The Securities and Exchange Commission (SEC) has introduced a new rule for public companies that requires them to be more transparent about cybersecurity incidents. The new rule requires companies to disclose any material cybersecurity incidents within four business days of…
Preparing for the Future: Understanding Identity’s Role in Data Security
By Gal Helemski, Co-Founder and CTO/CPO at PlainID “Data is the lifeblood of an organization.” Becoming somewhat of a platitude in the security space, it’s challenging to believe every organization truly upholds this sentiment. Yes, data is used to generate…
Hackers infiltrate servers of Japanese Government Cybersecurity Agency
In a concerning turn of events, the servers of Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) fell victim to a cyberattack by a hacking group, highlighting the vulnerability of even the most secure digital entities. NISC…
Anonymous Sudan launched Cyber Attack on X formerly Twitter
In a digital age where the lines between activism and hacking are increasingly blurred, Anonymous Sudan, a self-proclaimed hacktivist group with ties to the Russian Federation, recently launched a cyber-attack on the servers of the social media giant formerly known…
How to obtain cyber resilience in low security budgets
In the contemporary digital environment, the specter of cyberattacks casts a shadow over organizations of every scale. Despite the essential role that cyber resilience plays in protecting sensitive information and ensuring seamless business operations, numerous enterprises, particularly those operating within…
Battling malware in the industrial supply chain
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Here’s how organizations can eliminate content-based malware in…
Mobile threat defense or bust
The case for unified endpoint management and mobile threat defense The evolution of endpoint management Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile…