Hackers Are Creating Significant Cybersecurity Challenges As Ransomware Went Wild

Ransomware is on a rampage targeting industry and organizations. It is also and creating significant cybersecurity challenges. Ransomware is a type of malware cyber-attack where key files are encrypted encryption by hackers that renders data inaccessible to the victim. It is a criminal extortion tool and after an attack has

Read More

The Spy In Your Phone: Because Every System Can Be Hacked – Detail Story About How Pegasus Works

In mid-2020, a mobile phone belonging to an Al Jazeera Arabic investigative team was hacked. Over the next few months, reporter Tamer Almisshal and the Canadian research group Citizen Lab investigated Pegasus, the sophisticated spyware used. Pegasus is manufactured by an Israeli technology company called the NSO Group and is

Read More

3 Ways To Improve Vulnerabilities And Prevent Digital Supply Chain Cyberattacks

Today, most software products rely on thousands of prewritten packages produced by vendors or drawn from open source libraries. The most commonly used of these third-party software supply chain components are highly prized targets for cybercriminals. If attackers were to infiltrate them, they could compromise thousands or even millions of

Read More

More Efficient AI: Hope It Doesn’t Ever Join The Hackers

Hacking events have increasingly been in the news this year, as a range of serious ransomware and supply chain hacks have wrecked chaos on businesses and infrastructure. The latest (as of July 2021) is a supply-chain-ransomware attack against Miami-based software firm Kaseya, affecting 1500 of its customers – with the

Read More

SolarWinds Hack: Most Sophisticated Hack Of All Time – Says Microsoft

Details about the SolarWinds hack continue to emerge months after the supply chain mega-breach was first discovered late last year. The latest revelations come from Microsoft, which is calling the cyber-attack the most sophisticated of all time. “I think from a software engineering perspective, it’s probably fair to say that

Read More

Top Governance Risks For Board Directors And CEOs: Cybersecurity And Artificial Intelligence

Ask most board directors and CEO’s to define cybersecurity and artificial intelligence in a board meeting and have them share their answers and you may well find that their depth of knowledge is too shallow in their duty of care responsibilities. This, however, is fast changing after many years where

Read More

The Consequences Of A Future Hack? How AI Is Transforming Cybersecurity

Microsoft recently acknowledged Russian hackers successfully cyberattacked them. If hackers can penetrate their internal systems, what are the chances your company will suffer the consequences of a future hack? What the Russians have done is very bad, but it’s only an example of the cyber threats we all face. The

Read More

Revolutionize Utilities’ Security With Help Of AI And Video Analytics

According to Gartner’s latest CIO survey, 94% of Energy, Oil & Gas Utilities’ IT leaders prioritize location and cybersecurity, 38% are investing in Artificial Intelligence and machine learning and 17% in the Internet of Things including sensor-based video technologies. Energy, Oil & Gas Utilities are facing increasing pressure to reduce

Read More

Vishing Attack At The Ritz: A New Type Of Social Engineering Scam

There’s another clever fraud tactic to add to your library of security threats. Imagine a call or voice message that appears to come from a trusted source but is really a disguised attempt to compromise your identity, credentials or financial information. More of a social engineering scheme than a vulnerability,

Read More

Zero-Trust Cybersecurity: Trust No One? | A Panel Discussion

Protecting digital assets is becoming harder and harder, for one alarming reason: most organizations have poorly prepared for the deluge of cloud-based applications and end-point devices. This transformation has created vulnerabilities well beyond any corporate-controlled environment, expanding the potential for data breaches into completely unchartered territory. As the enterprise perimeter

Read More