The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Revelations From CISA Proves Phishing is a Public Menace
A cyber threat that’s nearly three decades old continues to be the most prolific and potent form of cybercrime on the planet. Phishing attacks are growing in volume and sophistication. An estimated 255 million phishing
Beyond IT: A Holistic Approach to Cybersecurity
Cybersecurity is one of the most critical issues facing organizations today. In 2021, data breaches cost companies an average of $4.24 million1, and the number of ransomware-related data leaks increased by 82%2. As the digital
The Dangers of Ransomware Through File-Sharing Software
Ransomware is an ever-growing threat to businesses and consumers alike. According to Jeff Thull, the Senior Director of Threat Research at Cisco, “Now we are dealing with cyber-based extortionists that seek to hide their identity
Best Practices for Countering Social Engineering Attacks
Ninety-eight percent of all cyber-attacks are variations of social engineering. This implies that businesses must constantly invest in cutting-edge approaches for their cybersecurity as cybercriminals invent new ways of exploiting organizations’ vulnerabilities. Unlike other forms of cyber-attacks,
Culturing a Healthy SOC Environment with AI
Security Operation Center, also known as SOC, plays a critical role in integrated security intelligence technologies and improving the overall organizational cybersecurity. SOC primarily focuses on defending against potential cyber threats, continuously monitoring networks, and
Is Online Shopping Safe? 6 Risks on E-Commerce Platforms
E-commerce is a rapidly growing sector, expected to see over 8 trillion sales globally by 2026. With such bountiful rewards, it’s no surprise that scammers and hackers jump on the opportunity to steal funds and
Software Startups: The Shift Left Security Strategy
Most modern-day software startups follow an iterative development process with frequent and incremental releases. It encourages teams to “fail early and fail often,” thus preventing disasters. Incrementally released software is developed and tested within a
7 Critical Security Measures for U.S. Data Centers
Data centers in the United States encounter all kinds of digital and physical security threats. They have to use every resource available to protect their precious information and keep their systems operational. Here are seven