Tag: EN

IAM & Detection Engineering

Introduction  In the ever-changing cybersecurity landscape, Identity and Access Management (IAM) stands as the cornerstone of an organisation’s digital asset protection. IAM solutions play an essential role in managing user identities, controlling access to resources and ensuring compliance. As the…

Why data, AI, and regulations top the threat list for 2024

The new year finds us confronted by a landscape characterized by political uncertainty, social fragmentation, escalating geopolitical tensions, and a turbulent macro-economic backdrop, making it crucial for security leaders to strategically prepare for the forthcoming challenges. Let’s explore the three…

How companies should recover when password breach occurs

Undoubtedly, every business worldwide is susceptible to cyber attacks and data breaches. The imperative response lies in implementing proactive measures to safeguard against such attacks and establishing an efficient disaster recovery plan for unforeseen events. Addressing password breaches, hackers frequently…

A closer look at the manufacturing threat landscape

The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing cybersecurity challenges. In this Help Net Security video, Kory Daniels, CISO at Trustwave, discusses recent comprehensive research highlighting the…

Are organizations moving away from passwords?

Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate users with a level of sophistication and reliability that transcends…

86% of cyberattacks are delivered over encrypted channels

Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second year in a row, manufacturing was the industry most commonly targeted, with education and government…

Ransomware Attacks: Are You Self-Sabotaging?

[By Andy Hill, Executive Vice President, Nexsan] No IT professional is unaware of the staggering risk of ransomware. In 2023, recovering from a ransomware attack cost on average $1.82 million—not including paying any ransom—and some organizations get hit more than…

Cybersecurity Tips to Stay Safe this Holiday Season

[By Craig Debban, CISO of QuSecure] Have you ever been on a trip and realized that you forgot to pack something important? It’s easy to overlook things during the hustle and bustle of traveling, especially during the holidays. Unfortunately, cybercriminals…

Role of Parents in Teaching Online Safety

In today’s digital landscape, where children are increasingly exposed to the vast world of the internet, the role of parents in teaching online safety has… The post Role of Parents in Teaching Online Safety appeared first on Security Zap. This…

Addressing Cyberbullying and Online Harassment

Cyberbullying and online harassment have become significant concerns in today’s digital landscape. With the rise of social media platforms and online forums, it is crucial… The post Addressing Cyberbullying and Online Harassment appeared first on Security Zap. This article has…

Google addressed a new actively exploited Chrome zero-day

Google has released emergency updates to address a new actively exploited zero-day vulnerability in the Chrome browser. Google has released emergency updates to address a new zero-day vulnerability, tracked as CVE-2023-7024, in its web browser Chrome. The flaw has been…

German police seized the dark web marketplace Kingdom Market

The German police seized the dark web marketplace Kingdom Market as a result of an international law enforcement operation. The Federal Criminal Police Office in Germany (BKA) and the internet-crime combating unit of Frankfurt (ZIT), along with law enforcement agencies…