Artificial Intelligence January 24, 2025 Are successful deepfake scams more common than we realize? 4 min read - Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of…
Risk Management January 24, 2025 How cyberattacks on grocery stores could threaten food security 4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford,…
Risk Management January 23, 2025 Taking the fight to the enemy: Cyber persistence strategy gains momentum 4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting…
Cloud Security January 22, 2025 2024 Cloud Threat Landscape Report: How does cloud security fail? 4 min read - Organizations often set up security rules to help reduce cybersecurity vulnerabilities and risks. The 2024 Cost of a Data Breach Report discovered that 40% of all data breaches involved data distributed across multiple environments, meaning that these best-laid plans often…
Cloud Security January 22, 2025 2024 Cloud Threat Landscape Report: How does cloud security fail? 4 min read - Organizations often set up security rules to help reduce cybersecurity vulnerabilities and risks. The 2024 Cost of a Data Breach Report discovered that 40% of all data breaches involved data distributed across multiple environments, meaning that these best-laid plans often…
Risk Management January 21, 2025 Are attackers already embedded in U.S. critical infrastructure networks? 4 min read - The threat of cyberattacks against critical infrastructure in the United States has evolved beyond data theft and espionage. Intruders are already entrenched in the nation’s most vital systems, waiting to unleash attacks. For instance, CISA has raised alarms about Volt…
Risk Management November 6, 2024 What Telegram’s recent policy shift means for cyber crime 4 min read - Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain…
Data Protection January 21, 2025 Why maintaining data cleanliness is essential to cybersecurity 3 min read - Data, in all its shapes and forms, is one of the most critical assets a business possesses. Not only does it provide organizations with critical information regarding their systems and processes, but it also fuels growth and enables better decision-making…
Risk Management January 21, 2025 Are attackers already embedded in U.S. critical infrastructure networks? 4 min read - The threat of cyberattacks against critical infrastructure in the United States has evolved beyond data theft and espionage. Intruders are already entrenched in the nation’s most vital systems, waiting to unleash attacks. For instance, CISA has raised alarms about Volt…
Artificial Intelligence January 17, 2025 How to calculate your AI-powered cybersecurity’s ROI 4 min read - Imagine this scenario: A sophisticated, malicious phishing campaign targets a large financial institution. The attackers use emails generated by artificial intelligence (AI) that closely mimic the company’s internal communications. The emails contain malicious links designed to steal employee credentials, which…