Anyone remotely wired into technology newsfeeds – or any newsfeeds for that matter – will know that AI (artificial intelligence) is the topic of the moment. In the past 18 months alone, we’ve borne witness to the world’s first AI…
Tag: Blog RSS Feed
Life in Cybersecurity: From the Classroom to the Next Generation of Cybersecurity Professional
When you speak with many of the seasoned veterans of cybersecurity, it is not unusual to learn of the twisted path in technology that eventually landed them in the security profession. However, the newest cybersecurity professionals are digital natives. They…
AI Autonomy and the Future of Cybersecurity
Have you ever wondered how Artificial Intelligence (AI) could mimic consciousness and autonomously control various tasks? It sounds rather daunting. However, it may not be as intimidating as it seems under the right conditions. Moreover, Would AI perform tasks independently…
Understanding Vulnerability Management and Patch Management
Vulnerability management and patch management are often confused. However, it’s crucial to recognize that, while complementary, they are distinct processes. Understanding the differences between vulnerability management and patch management is essential for a solid security posture. Let’s delve into the…
How Can FIM Protect Against Insider Threats
An insider threat is someone inside an organization – including current and former employees, partners, and contractors – who, intentionally or otherwise, put their organization at risk. They typically abuse their access to private information and privileged accounts to steal…
“Largest Botnet Ever” Disrupted. 911 S5’s Alleged Mastermind Arrested
A vast network of millions of compromised computers, being used to facilitate a wide range of cybercrime, has been disrupted by a multinational law enforcement operation. The 911 S5 botnet, described as “likely the world’s largest botnet ever” by FBI…
Data Destruction: The Final Line of Defense Against Cyber Attacks
Data is the lifeblood of modern organizations, and while watertight data protection policies are undeniably crucial, the need for robust data destruction methods has never been more pressing. Ultimately, all parties and vendors in your supply chain trust you to…
EU Is Tightening Cybersecurity for Energy Providers
The energy sector is having a tumultuous decade. During the COVID pandemic, the price of oil plummeted. In 2021, a ransomware attack forced one of the US’s most significant oil pipelines to cease operations for five days, causing a state…
Cloud Sprawl: How to Tidy It Up
Cloud computing offers indisputable benefits, but with the caveat that it can quickly become a disorganized jumble unless adequately managed. It’s common for the average organization to use dozens of cloud instances, solutions, and resources scattered across multiple platforms. Such…
Measuring the Effectiveness of File Integrity Monitoring Tools
A security incident can be the result of a single unauthorised change. A few may say, ‘one change is inconsequential, don’t sweat the small stuff.’ But when it comes to infrastructure security, the detail is of paramount importance! Just a…