Tag: EN

Understanding ISO 27001:2022 Annex A.8 – Asset Management

  ISO 27001:2022 Annex A.8, “Asset Management,” addresses the importance of identifying, classifying, and managing information assets within an organization. This annex emphasizes the need for organizations to establish processes for inventorying assets, assessing their value, and implementing appropriate controls…

WordPress: Critical Flaw Detected in MiniOrange Plugins

Concerned about the vulnerability of WordPress plugins jeopardizing your website’s security? Did you know? Vulnerable plugins are the primary cause of WordPress site hacks, accounting for 55.9% of attacks. But should you stop using plugins altogether? In website development, it’s…

ISO 27001:2022: chapter by chapter description

Contents Toggle What’s New in ISO 27001:2022 Chapter 1-3: Scope, Normative References and  Terms and Definitions Chapter 4: Context of the Organization Goal Actions Implementation Chapter 5: Leadership Goal Actions Implementation Chapter 6: Planning Goal Actions Implementation Chapter 7: Support…

Giant Tiger Data Breach: Customers Data Exposed Via Vendor

Giant Tiger, a prominent Ottawa-based discount retailer, has announced a breach of customer data. This incident, linked to a third-party vendor responsible for managing the retailer’s customer communications and engagement, has put the personal information of an undisclosed number of…

Podcast Episode: About Face (Recognition)

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Is your face truly your own, or is it a commodity to be sold, a weapon to be used against you? A company called Clearview AI has scraped the internet to…

Medusa Ransomware group demands $700k from victims

Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting…

How threat intelligence data maximizes business operations

Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a…

Strengthening critical infrastructure cybersecurity is a balancing act

In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience against cyberattacks. How do current cybersecurity strategies address the critical infrastructure sectors’…