By Matt Lindley, COO and CISO at NINJIO The AI mania over the past year has been illuminating in many ways. Despite the emergence of exciting new technology such as generative AI tools that can produce a vast library of…
Tag: Cybersecurity Insiders
What is a diamond model of Intrusion Analysis
The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…
Cyber Attack on US Bank forces it to transit data via USB Sticks
In a world plagued by numerous cyberattacks and their devastating aftermath, a recent incident involving the Industrial & Commercial Bank of China (ICBC) has drawn significant attention. ICBC, one of the world’s largest banks, was forced to resort to a…
Why you need ZTNA with Desktops-as-a-Service
By Karen Gondoly, CEO of Leostream As the world increasingly works remotely, Desktops as a Service (DaaS) are becoming ubiquitous in many industries. Remote workers need access to cloud and on-premise data and applications, and delivering that access in a…
Eight Ways to Bolster Your Cybersecurity Resources Without Blowing Your Budget
By Karen Lambrechts, Lansweeper IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a Data Breach Report 2023 UK organisations shell out an average of £3.4m for data breach incidents. There isn’t a CISO…
Is Microsoft ChatGPT grappling with DDoS Cyber Attack
In recent days, Microsoft’s generative AI tool, ChatGPT, has been experiencing connectivity problems. The official message on the website indicates that their servers are operating at full capacity. However, an article published by Bloomberg suggests that the technology giant’s AI…
How can a CEO or a CTO lose their jobs on ransomware attacks
In accordance with the newly introduced federal guidelines, the responsibility for a company facing a ransomware attack is now placed squarely on the shoulders of its CTO or CEO. Legal repercussions may be initiated against the targeted business if it…
Ten 10 ways Senior Citizens and Disabled can stay cyber safe and secure online
Online banking and services help disabled and senior citizens gain access to valuable services from the comfort of their homes, that otherwise can only be availed on a physical note. However, with the increase in digitalization, hackers are seeing such…
Can a Brute Force Attack Be Reversed?
Brute force attacks are a common and often successful method employed by hackers to gain unauthorized access to various systems, accounts, or data by systematically trying all possible combinations of passwords or encryption keys. While it may seem like the…
Fresh Optus Australia server disruption not caused by a Cyber Attack
Optus, the Australian counterpart of Singapore Telecommunications, faced a significant disruption on Wednesday, leading to widespread service outages affecting millions of customers. While some initially speculated that the outage was the result of a national emergency or a state-sponsored attack,…