Government’s Role In Preventing Cyber-Attacks: A Effective Approach To Cyber Threats Is To Be More Focused On The Real Enemy

In the face of ever-more complex cyber threats, governments need to employ the full range of tools to deter adversaries. Responding To Exponentially Growing Cyber Threats In April 2021, based on a tip from the Federal Bureau of Investigation (FBI) and aided by public sanction data from US Department of

Read More

4 Types Of Approaches For Cybersecurity In Small And Midsize Businesses: Monitor And Target, Always Expect A Breach, Create A Culture Of Security & Scrutinize Your Supply Chain

Small and midsize businesses aren’t immune to cyber threats. They must research and prepare for attacks just as large enterprises would. Unfortunately, smaller companies typically have fewer resources and less talent available to help fortify against attacks. In March of last year, AI caught a sophisticated, highly targeted cyber-attack exploiting

Read More

Enabling Digital Trust: Cyber-Security Strategies For A Trusted – Digital Future

In the age of digital transformation, trust is an elusive asset, but one that’s never out of reach for organisations that have initiated the right actions, such as adopting a sustainable, forward-looking cyber-security strategy. “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin

Read More

How Create A Diverse, Nextgen, Cybersecurity Workforce – People, Process & Technology | A Panel Discussion

From supporting a permanent remote workforce and accelerating digital transformation to preparing for an expanded threat landscape – it is more critical than ever that Security Leaders have the right structure and support in place to face the challenges of a post-COVID world. CISO’s have been integral to organizations surviving

Read More

Cloud Migration: A Cohesive Approach To Cloud Strategy – Implementing The Right Mix Of Security, Trust, And Business Agility

Introduction Increasingly, global organizations are migrating from legacy on-premise infrastructure to the cloud in order to achieve greater business agility and resilience with a modern IT approach. Yet too often, cloud migration and cybersecurity are considered separately, with different teams focused on different phases of what could be a shared

Read More

Safeguarding Our Privacy: Cryptography – A Sophisticated Scientific Art In A Connected World

Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to become a sophisticated scientific art

Read More

Hackers Are Creating Significant Cybersecurity Challenges As Ransomware Went Wild

Ransomware is on a rampage targeting industry and organizations. It is also and creating significant cybersecurity challenges. Ransomware is a type of malware cyber-attack where key files are encrypted encryption by hackers that renders data inaccessible to the victim. It is a criminal extortion tool and after an attack has

Read More

The Spy In Your Phone: Because Every System Can Be Hacked – Detail Story About How Pegasus Works

In mid-2020, a mobile phone belonging to an Al Jazeera Arabic investigative team was hacked. Over the next few months, reporter Tamer Almisshal and the Canadian research group Citizen Lab investigated Pegasus, the sophisticated spyware used. Pegasus is manufactured by an Israeli technology company called the NSO Group and is

Read More

3 Ways To Improve Vulnerabilities And Prevent Digital Supply Chain Cyberattacks

Today, most software products rely on thousands of prewritten packages produced by vendors or drawn from open source libraries. The most commonly used of these third-party software supply chain components are highly prized targets for cybercriminals. If attackers were to infiltrate them, they could compromise thousands or even millions of

Read More

More Efficient AI: Hope It Doesn’t Ever Join The Hackers

Hacking events have increasingly been in the news this year, as a range of serious ransomware and supply chain hacks have wrecked chaos on businesses and infrastructure. The latest (as of July 2021) is a supply-chain-ransomware attack against Miami-based software firm Kaseya, affecting 1500 of its customers – with the

Read More