[By Daniel Barber, CEO and founder, DataGrail] Data privacy is a volatile market. While consumers continue to demand stronger personal data protections, companies are scrambling to keep track of an ever-evolving patchwork of applicable laws and regulations. In this environment, cybersecurity professionals…
Category: Cybersecurity Insiders
REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL (CCSP) CERTIFICATION
The Certified Cloud Security Professional (CCSP) is a highly respected cybersecurity certification that addresses the needs of professionals and employers for robust and adaptable cloud security expertise. As cyber threats continue to escalate, the demand for skilled cloud security professionals…
Ransomware hackers threaten to send SWAT teams to victimized patients
In recent times, cybercriminals have shifted their tactics, moving beyond the traditional ransomware attacks on corporate and government networks. Previously, their focus involved encrypting files and demanding ransoms. However, a new and alarming trend has emerged, wherein criminals are now…
Google malware exploit allows hackers to access accounts without passwords
Accessing an online account typically requires a username and password, but cybersecurity researchers at CloudSEK have uncovered a disturbing trend where hackers can gain unauthorized entry into Google accounts without the need for a password. This illicit method exploits malware,…
Country takes help of Blackhat Hackers infiltrating government websites
When a company’s website falls victim to hacking, conventional practice dictates that its IT staff or business leaders seek the assistance of forensic experts in cybersecurity to navigate negotiations with hackers and mitigate the situation. However, the Philippines has taken…
A Guide to Guarding Against Ransomware Attacks in 2024
In the ever-evolving landscape of cybersecurity, the threat of ransomware looms large. As we step into 2024, the sophistication and frequency of ransomware attacks continue to rise, making it imperative for individuals and organizations to adopt proactive measures to defend…
AI Will Be Powerful, But No Panacea
[By Neal Humphrey, VP Market Strategy at Deepwatch] Anyone following the deployment of self-driving cars knows the technology is proving far from foolproof. In the most recent development, the New York Times found that employees at the General Motors-owned autonomous…
Data Breached firm blames customers for reusing passwords
23andMe, renowned for its DNA testing and analysis services, has issued a statement placing blame on its users for a data breach that occurred last year. The genomics company openly admitted that its users were not adequately securing their accounts…
FBI says Capitol Bomb Threat hackers are hard to identify
Over the recent days, the FBI and various law enforcement agencies have been inundated with emails claiming bomb threats targeting Capitol buildings throughout the United States. Authorities express their frustration in attempting to trace the culprits behind these threats, as…
What is the qualification to become a Cybersecurity Analyst
Becoming a cybersecurity analyst typically requires a combination of education, skills, and practical experience. Here’s a general guide to the qualifications needed for this role: 1. Educational Background: Bachelor’s Degree: Many employers prefer candidates with a bachelor’s degree in a…