By Benjamin Preminger, Senior Product Manager, Cybersixgill “You can’t get good help nowadays.” The adage is true for many professions, but exceedingly so for cybersecurity. While cyber-attacks continue to grow in quantity and sophistication each year, most organizations are ill-prepared to defend…
Tag: Cybersecurity Insiders
A Guide to Handling SAP Security Breaches
By Christoph Nagy, SecurityBridge So your SAP system has been breached. While this is not an unusual occurrence, it’s still a serious issue that needs your immediate attention. Since SAP is one of the most widely used systems by organizations…
Eight 8 WhatsApp message links that you should never click on
Staying active on social media is a popular trend, and WhatsApp is one of the prominent platforms facilitating connections with both businesses and loved ones. However, security experts warn that, like any online service, this Facebook-owned subsidiary is susceptible to…
Employment Scams On The Rise: What Can HR Do To Mitigate Them?
Ani Banerjee, Chief Human Resources Officer, KnowBe4 Bad news. Your organization just announced a major restructuring, making your role “redundant”. You update your LinkedIn profile, using the #OpenToWork hashtag, and announce to prospective recruiters that you’re on the market, actively searching…
Cybersecurity horror stories and how to avoid them
By Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity 2023 has seen a host of malicious cyber-attacks targeting a range of organisations from police forces to healthcare providers. The threat landscape has transformed drastically across the course of my career,…
DP World Cyber Attack puts Australia on High Alert
Over the recent weekend, DP World Australia, a prominent maritime freight operator, fell victim to a sophisticated digital attack, prompting swift action from authorities. In response to the breach, access to the corporate network was temporarily halted, and operations at…
Enhancing Ransomware Defense through Micro-Segmentation of Networks
In an era where cyber threats continue to evolve in sophistication, organizations are increasingly turning to advanced security measures to protect their digital assets. One such strategy gaining prominence is micro-segmentation of networks, a powerful approach that proves invaluable in…
It’s Never Too Soon to Begin Thinking About Your 2024 Cybersecurity Journey
John Siegel, Director of Strategy, Field CTO, Axis Security Was it me, or did 2023 roll by fast? It feels like it was a blur to me. The end of the year is here and it’s time to pause, take stock, and…
Cyber Attack news headlines trending on Google
The Washington State Transportation website and its mobile app experienced a disruption due to a sophisticated cyber attack earlier this week. According to information shared on the X, WSDOT ferry vessel watch social media platform, both online freight services and…
What is the Diamond Model of Intrusion Analysis – And How to Use the Framework
The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…