Category: Cybersecurity Insiders

Thinking about a Career in Security Operations? Follow this Path

Security operations professionals are the first to sound the alarm on intrusion attempts by bad actors. Organizations rely on them for security monitoring, security incident management, vulnerability management, security device management and network flow monitoring.  Are you ready for a…

LockBit using botnets to send 9 million emails

The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) recently issued a warning regarding the LockBit ransomware group’s latest tactics. Dubbed the LockBit Black Ransomware Campaign, this operation utilizes the Phorpiex Botnet to orchestrate a large-scale phishing email onslaught. According…

The Top 7 IAM Tools in 2024

Identity and access management (IAM) tools are important for protecting network infrastructure by setting parameters for who can access it and when. If you’re looking for the best identity and access management tools to use this year, here are some…

PRODUCT REVIEW: SYXSENSE ENTERPRISE

Today’s digital transformation is rapidly changing the IT and cybersecurity landscape: Remote work and the  increased shift to the cloud has broadened the attack surface, introducing new vulnerabilities as employees  connect from everywhere. This situation is compounded by the rise…

Best Practices for Companies in protection of User Data

In today’s digital age, where data breaches and cyber threats are rampant, safeguarding user data has become paramount for companies across industries. With increasing concerns about privacy and data security, businesses must prioritize robust measures to protect the sensitive information…

Britain NCSC faces Password Embarrassment

The inception of the National Cyber Security Centre (NCSC) of the United Kingdom in 2016 marked a pivotal step in issuing alerts concerning cyber attacks and hacking incidents. Tasked as the cyber arm of GCHQ (Government Communications Headquarters), its primary…

Combatting foreign interference

The spectre of foreign interference, ranging from corporate espionage to intellectual property theft, poses significant threats to organisations striving for competitive edge. Against this backdrop, the release of the 2024 Insider Risk Investigations Report by the DTEX i3 team underscores…

Ascension suffers Cyber Attack

Ascension, a provider of services related to hospital care and senior living facilities, has released an official statement acknowledging a cyber-attack on its IT network. The exact nature of the incident has yet to be disclosed, but unofficial reports suggest…