n today’s interconnected and technology reliant world, the expectation of trust and need to trustis growing. [1] Today’s trust-based solutions may become non-viable in the future....
Month: August 2022
CISO2CISO Notepad Series Last Article Publication Surveys on Cyber Security User most voted post ZERO TRUST
CISO Perspectives and Progress in Deploying Zero Trust Report & Survey by Cloud Security Alliance CSA
Report on the results of a CSA CISO survey. Areas covered include where Zero Trust falls as a priority in the organization, the percentage of those...
Do companies have a false sense of database security?
Do companies have a false sense of database security?This month, Black Hat 2022 celebrated its 25th year and gathered thousands of security experts and executives from...
GigaOm Recognizes DTEX as the Only Outperforming Leader in 2022 Data Loss Prevention Radar Report
GigaOm Recognizes DTEX as the Only Outperforming Leader in 2022 Data Loss Prevention Radar ReportThere is nothing more gratifying in a crowded market filled with good...
Lloyd’s Backs Off Insurance for State-Sponsored Cyberattacks
Lloyd’s Backs Off Insurance for State-Sponsored CyberattacksLloyd's Backs Off Insurance for State-Sponsored Cyberattacks brooke.crothers Tue, 08/30/2022 - 15:00 22 views Cyber related businesses are ‘evolving risk’...
Tech knowledge: Parents believe their children have overtaken them
Tech knowledge: Parents believe their children have overtaken them We’ve recently conducted research that shows that over half of UK parents believe that their child is...
Updated for 2022: What is Network Traffic Analysis? A Beginner’s Guide
Updated for 2022: What is Network Traffic Analysis? A Beginner’s Guide87 percent of organizations use network traffic analysis (NTA) tools for threat detection and response according...
Dealing with a ransomware attack: How can firms spot and recover from these threats?
Dealing with a ransomware attack: How can firms spot and recover from these threats?Ransomware has been one of the biggest cybersecurity trends of the last few...
Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage Attacks
Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage AttacksA months-long cyber espionage campaign undertaken by a Chinese nation-state group targeted several entities with reconnaissance malware...
Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks
Google Launches New Open Source Bug Bounty to Tackle Supply Chain AttacksGoogle on Monday introduced a new bug bounty program for its open source projects, offering...
Interested in Reducing Your Risk Profile? Jamf Has a Solution for That
Interested in Reducing Your Risk Profile? Jamf Has a Solution for ThatThe threat landscape has changed dramatically over the past decade. While cybercriminals continue to look...
Hackers Hide Malware in Stunning Images Taken by James Webb Space Telescope
Hackers Hide Malware in Stunning Images Taken by James Webb Space TelescopeA persistent Golang-based malware campaign dubbed GO#WEBBFUSCATOR has leveraged the deep field image taken from...