The anticipated advent of quantum computing will have a devastating impact on existing modes of asymmetric data encryption. It’s likely that within the next few years, quantum-capable entities will gain the ability to decrypt virtually every secret possessed by individuals,…
Category: Cybersecurity Insiders
Beware of Trading Bot Scams
TL;DR — do not deploy smart contract code that you do not understand, and do not send tokens or ETH to contracts that are not managed by an entity that you trust. I can’t believe that trading bot scams on…
How can AI be used to keep customer data secure?
In the modern world of business, there’s seemingly an unlimited number of uses for artificial intelligence (AI). From automating repetitive tasks to shaping high-level decision-making processes, the technology has a foothold in the corporate landscape and its influence is only…
Microsoft email servers hack could have been prevented
Microsoft publicly disclosed several months ago that a Chinese hacking group, Storm-0558, breached its servers in early the previous year, initiating surveillance on email servers associated with senior US government officials. Following an investigation, Members of Congress assert that Microsoft’s…
Understanding the Vital Role of Indicators of Compromise (IOCs) in Cybersecurity
In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount. One crucial tool in the arsenal of cybersecurity professionals is Indicators of Compromise (IOCs). These IOCs serve as early warning signs, enabling organizations to detect and respond to…
Navigating the API Threat Landscape in Finance
Traceable AI just released a report on the escalating concerns surrounding API security within the financial services sector. The comprehensive study, which canvassed insights from over 150 cybersecurity experts across the United States, reveals a landscape fraught with vulnerabilities and…
Excellence in the essentials of cybersecurity – below the ‘poverty line’
The ‘cybersecurity poverty line’ was a term coined over ten years ago by a Cisco security leader, Wendy Nather. We often hear it described as the resource “threshold” for adequate cyber protection. The companies beneath the line lack the budget,…
Switzerland government websites hit by DDoS Cyber Attack
Numerous government-operated websites have fallen victim to a cyber attack resembling a distributed denial of service (DDoS) assault. In this type of attack, botnets generate fake web traffic aimed at overwhelming web servers, causing immediate disruptions. Curiously, this attack occurred…
The Rise of Universal ZTNA
The way we work has drastically changed over the last few years. Our data, users, devices, and applications are now everywhere. Just look at the hybrid workforce. According to the Society for Human Resource Management, by next year, 82% of…
Expert comment: Apple AI safety & security
Please see below comments by Kevin Surace, Chair, Token & “Father of the Virtual Assistant” for your consideration regarding ant coverage on Apple’s recent AI announcement: Apple has taken a “privacy and security first” approach to handling all generative AI…