Tag: Cybersecurity Insiders

WhatsApp offers new contact management for data security

In recent times, WhatsApp users have typically followed a straightforward process when it comes to managing their contacts: they would save a contact to their mobile device and then access it through the messaging platform whenever necessary. While WhatsApp has…

2024 Report: Insider Threat

Introduction The landscape of insider risk management continues to evolve rapidly, driven by increasing complexities in IT environments, the adoption of hybrid work models, and the rise in adoption of sophisticated GenAI tools by knowledge workers. This 2024 Insider Threat…

Guarding Digital Assets By Understanding Third-Party Access Risks

Companies depend on external partners to support operations and provide various services. Collaborating with contractors, consultants and auditors is often a necessity. However, the reliance on external resources also creates notable security concerns, as allowing partners to access the network…

Ransomware hackers using cloud service platforms as their playgrounds

In recent years, we have witnessed a significant rise in cybercriminal activities, particularly involving ransomware attacks. These gangs have become notorious for infiltrating networks and encrypting sensitive databases, rendering critical data inaccessible unless a ransom is paid. This extortion tactic…

DdoS Attack on Russian Foreign Ministry during BRICS summit

In an increasingly interconnected world, it has become a common phenomenon for hackers to orchestrate sophisticated cyber attacks targeting significant global events. The motives behind these cyber offensives often range from gaining notoriety to making a statement about pressing national…

Complex controls: Addressing PCI DSS by 2025

PCI DSS 4.0.1 may have been with us for six months now but the reality is that most entities still won’t have made the transition to the new standard in full. This is because the majority of the requirements (51…

Building a Cyber Resilience Framework for Credit Unions

Caught in the digital crosshairs, financial institutions (including credit unions) stand on the front lines of the cybercrime battlefield. These organizations play a vital role in the daily operations of businesses and customers, processing vast amounts of personal and financial…

Can Offline Data Storage Curb Ransomware Attacks?

In an age where cyber threats are an ever-looming concern, ransomware attacks have emerged as one of the most disruptive and financially devastating forms of cybercrime. These malicious attacks encrypt a victim’s data, rendering it inaccessible until a ransom is…