1.) A cloud computing firm named ‘Trellance‘ recently fell victim to hackers spreading ransomware, causing disruptions and outages for approximately 60 credit unions in the United States. The National Credit Union Administration (NCUA), responsible for overseeing technology related to federal…
Category: Cybersecurity Insiders
Understanding Mobile Network Hacking: Risks, Methods, and Safeguarding Measures
In an era dominated by mobile connectivity, the security of mobile networks has become a critical concern. Mobile network hacking refers to unauthorized access and manipulation of mobile communication systems, posing significant risks to individuals and organizations alike. This article…
Getting your organisation post-quantum ready
While quantum computing is still very much in its early stages, it’s important that companies are already thinking about this evolving technology – and more importantly implementing and stress testing much needed solutions suitable for a post-quantum world. In this…
Japan Aerospace Agency hit by ransomware attacks
Japan Aerospace Exploration Agency, commonly referred to as JAXA, recently fell victim to a cyber attack believed to be a ransomware variant. While an official confirmation on the nature of the cyber incident has been issued, specific details regarding the…
Google and Meta complain about China’s misbehavior online
In a reminiscent scene of a child complaining to their parents about a friend or schoolmate’s behavior, both Meta and Google have recently voiced their concerns over China’s online conduct. Meta, the owner of the popular social media network, released…
Exploring Secure Alternatives to Traditional Passwords
In an era dominated by digital interactions, the need for robust online security measures is more crucial than ever. Passwords, once the primary guardians of our digital realms, are facing increasing vulnerabilities, prompting a search for more secure alternatives. Let’s…
How mobile network automation will drive success for operators
Mobile Network Operators (MNOs) are under huge pressure from enterprises and consumers to deliver fast and efficient services – but meeting these expectations in the face of exploding data demands is not an easy task. Fortunately, automation has emerged as…
Unlocking the Full Potential of Unified SASE: An Interview with HPE’s Chris Hines
As organizations pivot toward more distributed and fragmented models of work, cybersecurity measures must adapt to keep pace with the evolving threat landscape and expanding attack surface. In an in-depth interview with Chris Hines, VP of Strategy and Global Marketing…
Tips to Get Certified in Cybersecurity in 30 Days
Cybersecurity is a constantly expanding field. At the same time, there simply aren’t enough qualified people to fill the available jobs out there. Research shows the world needs an influx of 4 million more cybersecurity professionals to meet demand. Now’s…
WEBINAR: Vulnerability Risk Management – The Lynchpin of Proactive Security
Join our friends at Forrester and Brinqa on Dec 5 for a live webinar to learn how vulnerability risk management is the foundation for proactive security [register here] At this virtual event, you will learn how companies like Nestle, GitHub,…