Category: EN

Data Governance and the Mandate for Tougher Security in 2025

The challenges around data governance are evolving rapidly, driven by the rapid adoption of generative AI, stringent regulatory requirements, and heightened cybersecurity risks. As we approach 2025, organisations are realising that traditional approaches to data governance are no longer sufficient.…

Healthcare Security Strategies for 2025

Imagine this: It’s a typical Tuesday morning in a bustling hospital. Doctors make their rounds, nurses attend to patients, and the hum of medical equipment creates a familiar backdrop. Suddenly, screens go dark, vital systems freeze, and a chilling message…

Top cybersecurity books for your holiday gift list

The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book can provide both knowledge and inspiration. To help with ideas on what to give, we’ve compiled a list of cybersecurity…

What makes for a fulfilled cybersecurity career

In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfilled…

Businesses plagued by constant stream of malicious emails

36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and 2.3% of those contained…

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren’t; Polish spy boss arrested, and more Infosec in brief  Still smarting over that grocery disruption caused by a ransomware attack on supply chain SaaS vendor Blue…

Why Compliance in Cloud Security Can’t Be Ignored

How Does Compliance Impact Cloud Security? Are we fully conscious of the significant correlation between compliance and cloud security? With the increasing reliance on cloud-based solutions, the challenge of maintaining security compliance in the cloud environment has become a pivotal…

Compliance in Cloud Security

Is Your Cloud Security Compliant? With increasing reliance on cloud systems across industries, it’s time to ask hard-hitting questions. Is your cloud security up to par? Are your Non-Human Identities (NHIs) effectively managed? As businesses continue to innovate and adapt,…

Ensuring Calm with Effective Secrets Scanning Techniques

Are You on the Safe Side with Your Secrets Scanning? In the realm of cybersecurity, there’s a formidable challenge to be tackled: the management of Non-Human Identities (NHIs) and Secrets. This entails not only securing these machine identities and the…

CURLing for Crypto on Honeypots, (Mon, Dec 9th)

I get a daily report from my honeypots for Cowrie activity [1], which includes telnet and SSH sessions attempted on the honyepot. One indicator I use to find sessions of interest is the number of commands run. Most of the…

Transform IAM From Technology Burden To Business Advantage

Transform IAM from a burden to a business advantage. Discover how strategic IAM enables agility, reduces risk, and drives digital transformation success. The post Transform IAM From Technology Burden To Business Advantage first appeared on Identient. The post Transform IAM…