Most people are familiar with the concept of Schrödinger’s Cat – a thought experiment, whereby a hypothetical cat is sealed in a box with a radioactive substance and a device that releases a poison if the radioactive substance decays. The…
Category: Cybersecurity Insiders
Maryland Association of Community Colleges and BCR Cyber Receive TEDCO Grant
Equitech Growth Fund Award for Developing Infrastructure to Enable Workforce Development Efforts Baltimore, MD (12/19/24) – The Maryland Association of Community Colleges (MACC), the advocate and unified voice for Maryland’s 16 community colleges, and BCR Cyber, a leading provider of…
New Report Shows That The U.S. Leads in Anonymous Open-Source Contributions
A recent report by Lineaje AI Labs has revealed that the United States is the top contributor to open-source projects, but it also leads in anonymous contributions, raising significant concerns about transparency and security in the global software supply chain. …
Navigating AI Risks: Best Practices for Compliance and Security
As we head into the new year, organizations face escalating governance, security, and regulatory compliance challenges, especially as AI adoption accelerates. To help businesses navigate these complexities and prepare for 2025, Henry Umney, Managing Director of GRC Strategy at Mitratech—a…
HackerOne Cybersecurity Platform Joins AWS Marketplace
HackerOne’s suite of cybersecurity tools, including bug bounty programs and vulnerability disclosure services, is now available through the AWS Marketplace, expanding options for organizations to strengthen their cloud security. The platform provides tools for penetration testing, AI-assisted threat assessments, and…
How to Increase Your Cyber Resilience – and Customer Trust
According to the Identify Theft Resource Center, the number of data compromises reported in the first half of 2024 increased 14% compared to the same period in 2023. With cyberattacks increasing and impacting businesses of all sizes, more and more…
2025 Cybersecurity Predictions
Prediction 1: Robust supply chain security is not optional; it’s essential for safeguarding against software vulnerabilities. •In 2025, businesses need to safeguard themselves from security risks linked to software dependencies – that is, external applications or code they rely on.…
Could better backups reduce cyber insurance premiums?
Cyber insurance is now becoming more widely adopted with 43% of businesses now holding a policy and premiums have fallen for the first time this year, with the Global Insurance Market Index showing a decline of 6% over the last…
How to Implement a Balanced Approach to Cybersecurity: Prioritizing Mission, Safety, and Compliance
Companies are adopting new technologies — such as AI — to help improve operations and enhance customer service. But 77% of CEOs worry about emerging security risks tied to these applications and tools. Businesses must find a way to navigate…
Fenix24 Debuts Argos99 to Fortify Cyber Resilience and Streamline Incident Recovery
Fenix24™, a leading provider of incident response recovery solutions, has introduced Argos99™, the latest addition to its suite of cybersecurity services. This innovative offering, developed in collaboration with Conversant Group’s renowned recovery expertise, is designed to enhance organizations’ cyber resilience…
Russia targets Ukraine sensitive data servers with Cyber Attacks
Russia appears to be tightening its grip on Ukraine through multiple means, simultaneously escalating military attacks and launching sophisticated cyber offensives. On the military front, Russian forces are deploying ballistic missiles targeting Kyiv and surrounding regions, creating widespread destruction. However,…
Rising wave of cyber-attacks targeting YouTube content creators
In today’s digital age, YouTube has become a platform where individuals, especially those between the ages of 14 and 33, are not just consuming content but actively creating it. From cooking tutorials and gaming streams to travel vlogs and tech…
Russia imposes official ban on Cybersecurity firm Recorded Future
For the first time in the history of the Russian Federation, Recorded Future has been officially banned from conducting any business operations within the country. This decision appears to take immediate effect and will remain in place until further notice…
2025 Predictions for the Cyberwarfare Landscape
As cyberattacks become more frequent and targeted, the potential for significant collateral damage increases, complicating efforts to maintain societal resilience. Looking ahead to 2025, the question we must ask ourselves is: how can we protect our most vulnerable infrastructure from…
What 2025 May Hold for Cybersecurity
Cybersecurity is dynamic, ever changing and unpredictable. This past year contained significant surprises. Who would have thought the largest data breach incident of 2024 would involve no malware or vulnerability exploitation? Subject matter experts often make inaccurate predictions. Rather than…
Digital Trust Is Declining. Businesses Must Respond
Once a cornerstone of the digital promise, trust has been undermined by corporate misuse, data breaches, disinformation, and the growing realization that what we see online might not even be real. The effects are far-reaching, touching not only our interactions…
What SAP Security Can Learn From Successful European Football (Soccer) Teams
Team competitions like the European Football Championships repeatedly show that the supposed favorites do not always win. These competitions have their dynamics and often enable teams to exceed their limits and achieve excellent results. It is reasonable to ask how…
The AI Threat: It’s Real, and It’s Here
We’re at a defining moment in cybersecurity that will determine organizational survival. Transform or be transformed by a competitor—this isn’t a slogan, it’s a survival mandate. As organizations integrate AI into their business and security operations, they face increased identity…
The 2025 cyber security threat landscape
The cybersecurity landscape in 2025 is sure to undergo transformative shifts driven by technological advancements and evolving global threats. The integration of AI into cybercriminal operations, the growing reliance on tokenized payment systems, and the increasing intersection of geopolitics with…
TP Link routers to be banned for data security concerns
During the previous administration under President Donald Trump, Chinese telecom and networking equipment suppliers, including ZTE and Huawei, faced significant trade restrictions in the United States. These bans are still in effect under President Joe Biden’s administration, with no signs…