Category: Cybersecurity Insiders

Generative AI: Bringing Cybersecurity Readiness to the Broader Market

By Benjamin Preminger, Senior Product Manager, Cybersixgill “You can’t get good help nowadays.” The adage is true for many professions, but exceedingly so for cybersecurity. While cyber-attacks continue to grow in quantity and sophistication each year, most organizations are ill-prepared to defend…

A Guide to Handling SAP Security Breaches

By Christoph Nagy, SecurityBridge So your SAP system has been breached. While this is not an unusual occurrence, it’s still a serious issue that needs your immediate attention. Since SAP is one of the most widely used systems by organizations…

Employment Scams On The Rise: What Can HR Do To Mitigate Them?

Ani Banerjee, Chief Human Resources Officer, KnowBe4 Bad news. Your organization just announced a major restructuring, making your role “redundant”. You update your LinkedIn profile, using the #OpenToWork hashtag, and announce to prospective recruiters that you’re on the market, actively searching…

Cybersecurity horror stories and how to avoid them

By Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity 2023 has seen a host of malicious cyber-attacks targeting a range of organisations from police forces to healthcare providers. The threat landscape has transformed drastically across the course of my career,…

DP World Cyber Attack puts Australia on High Alert

Over the recent weekend, DP World Australia, a prominent maritime freight operator, fell victim to a sophisticated digital attack, prompting swift action from authorities. In response to the breach, access to the corporate network was temporarily halted, and operations at…

Cyber Attack news headlines trending on Google

The Washington State Transportation website and its mobile app experienced a disruption due to a sophisticated cyber attack earlier this week. According to information shared on the X, WSDOT ferry vessel watch social media platform, both online freight services and…

What is a diamond model of Intrusion Analysis

The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…

Why you need ZTNA with Desktops-as-a-Service

By Karen Gondoly, CEO of Leostream As the world increasingly works remotely, Desktops as a Service (DaaS) are becoming ubiquitous in many industries. Remote workers need access to cloud and on-premise data and applications, and delivering that access in a…

Is Microsoft ChatGPT grappling with DDoS Cyber Attack

In recent days, Microsoft’s generative AI tool, ChatGPT, has been experiencing connectivity problems. The official message on the website indicates that their servers are operating at full capacity. However, an article published by Bloomberg suggests that the technology giant’s AI…

Can a Brute Force Attack Be Reversed?

Brute force attacks are a common and often successful method employed by hackers to gain unauthorized access to various systems, accounts, or data by systematically trying all possible combinations of passwords or encryption keys. While it may seem like the…