SolarWinds Hack: Most Sophisticated Hack Of All Time – Says Microsoft

Details about the SolarWinds hack continue to emerge months after the supply chain mega-breach was first discovered late last year. The latest revelations come from Microsoft, which is calling the cyber-attack the most sophisticated of all time. “I think from a software engineering perspective, it’s probably fair to say that

Read More

Top Governance Risks For Board Directors And CEOs: Cybersecurity And Artificial Intelligence

Ask most board directors and CEO’s to define cybersecurity and artificial intelligence in a board meeting and have them share their answers and you may well find that their depth of knowledge is too shallow in their duty of care responsibilities. This, however, is fast changing after many years where

Read More

The Consequences Of A Future Hack? How AI Is Transforming Cybersecurity

Microsoft recently acknowledged Russian hackers successfully cyberattacked them. If hackers can penetrate their internal systems, what are the chances your company will suffer the consequences of a future hack? What the Russians have done is very bad, but it’s only an example of the cyber threats we all face. The

Read More

Revolutionize Utilities’ Security With Help Of AI And Video Analytics

According to Gartner’s latest CIO survey, 94% of Energy, Oil & Gas Utilities’ IT leaders prioritize location and cybersecurity, 38% are investing in Artificial Intelligence and machine learning and 17% in the Internet of Things including sensor-based video technologies. Energy, Oil & Gas Utilities are facing increasing pressure to reduce

Read More

Vishing Attack At The Ritz: A New Type Of Social Engineering Scam

There’s another clever fraud tactic to add to your library of security threats. Imagine a call or voice message that appears to come from a trusted source but is really a disguised attempt to compromise your identity, credentials or financial information. More of a social engineering scheme than a vulnerability,

Read More

Zero-Trust Cybersecurity: Trust No One? | A Panel Discussion

Protecting digital assets is becoming harder and harder, for one alarming reason: most organizations have poorly prepared for the deluge of cloud-based applications and end-point devices. This transformation has created vulnerabilities well beyond any corporate-controlled environment, expanding the potential for data breaches into completely unchartered territory. As the enterprise perimeter

Read More

Ransomware Crooks Start Selling Victims’ Data To The Highest Bidder

Being struck by ransomware used to mean that data would be lost forever unless you paid up. Those days are long gone. Today ransomware gangs are also stealing their victims’ data… and in some cases auctioning it off on Dark Web markets. The hackers behind the REvil or Sodinokibi ransomware have siphoned off terabytes of data from the systems they’ve infected. When victims aren’t willing to meet ransom demands, the REvil gang is more than willing to use alternative means to profit from their attacks.

Read More

Securing Your Work From Home

Even though millions of workers have been directed by their companies to work from home, it still shocks me that many of them are again not taking the proper precautions to protect their data. Some of this stems from the fact that many companies, at the onset of COVID-19, did not have substantial work from home security guidelines and requirements for users who were using their personal PCs or mobile devices to work from home. Some consumers still believe, falsely, that a severe data breach can’t happen to them.

Read More

Adopting A Zero Trust Security Approach: Keep This Five Things In Mind

The COVID-19 pandemic has brought about a seismic shift in how the world goes to work. Apart from essential services, remote work is the new normal, mandated everywhere – even in organizations that never previously offered remote work options. Lack of VPN infrastructure or its ability to scale, legacy systems that were never designed for remote work, previous reluctance to implement work from home, poor cybersecurity hygiene – all of these pose challenges for organizations trying to adjust to this new normal.

Read More