By Lisa Levy at Satori, the Data Security Platform As forward-thinking CIOs are well aware, the success of business process digitalization is intimately tied to the backbone of any digital endeavor: data. But it’s not just about having vast amounts…
Category: Cybersecurity Insiders
Reading between the Lines – How the INFORM Consumers Act Impacts Online Retailers
By Erik Gaston, Vice President of Global Executive Engagement, Tanium Cyber-criminals are nothing if not opportunistic. While the e-commerce industry is far from the “Wild, Wild West” – where infamous masked highway robbers ganged-up and ran rampant – today’s outlaws…
Introducing the next phase of 5G
It’s been over four years since 5G was introduced and the technology has now been rolled out across all the world’s major economies. So, we’re starting to think about what’s coming next…. Expansion into emerging markets With 5G already embedded…
Future forward cyber
For organizations of all sizes, cyber consistently earns a place on the agenda, becoming a focal point for business-critical initiatives and investments. Today, cyber means business, and it isn’t challenging to overstate the importance of cyber as a foundational and…
Holiday Season Cyber Alert: Reflectiz Declares War on Magecart Attacks
Reflectiz, a cybersecurity company specializing in continuous web threat management offers an exclusive, fully remote solution to battle Magecart web-skimming attacks, a popular type of cyberattacks involving injecting malicious code into the checkout pages. As the Holiday Season approaches, online…
TikTok hires British Security firm to banish data security concerns
Since 2018, TikTok, the Chinese-based video-sharing platform, has faced relentless criticism over its alleged mishandling of data security. Initially, the United States banned the app’s use on all government-issued phones, setting off a domino effect that led to similar actions…
The Nuanced Landscape of Insider Threats: A Conversation with Federico Charosky of Quorum Cyber
In a recent interview, Federico Charosky, CEO of Quorum Cyber, shed light on some often-underappreciated yet crucial facets of insider risk in cybersecurity. Charosky emphasizes the necessity of nuanced definitions when discussing the topic of insider risk. He argues that…
Avoid storing this data on mobile to curb privacy and security concerns
To mitigate privacy and security concerns, it’s advisable to refrain from storing certain types of data on your mobile devices. While smartphones are indispensable for staying connected and managing various aspects of our lives, safeguarding personal information should be a…
LockBit hackers steal sensitive documents from Britain Military Defense
The United Kingdom’s Ministry of Defense has once again found itself in the spotlight due to a recent cyberattack, with fingers of suspicion pointing towards Russian hackers. While there is no conclusive evidence to substantiate these claims, there is a…
How malware sandboxes can help strengthen cybersecurity
In the ever-evolving landscape of cybersecurity, the battle between cyber-criminals and defenders rages on. Cyberattacks are becoming more sophisticated and harder to detect, making it imperative for organizations to bolster their defenses. One powerful weapon in the cybersecurity arsenal is…