Resources

US Customers of Kaspersky Must Act Quickly Due to Government Ban on Company

US Bans the Use of Kaspersky's Antivirus Software: Implications and Recommendations for Businesses and Consumers The clock is ticking for US businesses and consumers using...

Failure in Staff Reporting Following Cyberattack on Ascension Hospitals

Impact of Ransomware Attack on Ascension Hospitals and Staff Concerns Ascension Hospitals Cyberattack Places Strain on Staff A ransomware attack in May against Ascension, one of...

Examining the Main Risks to Critical Infrastructure – Smart CISO

Exploring the Growing Threats to Critical National Infrastructure Martin Riley, Director of Managed Security Services at Bridewell, is on a mission to uncover the factors...

Cyberattack Disrupts Amtrak Guest Rewards Accounts in Breach

Recent Data Breach: Amtrak Guest Rewards Accounts Compromised Amtrak, the national passenger rail service, recently disclosed a data breach that has left train travelers' Guest...

Implementing a zero trust security policy: Understanding the basics

Understanding Zero Trust Security Framework: A Comprehensive Overview Zero trust isn’t a product, but rather a security framework that ensures every user and device accessing...

Unlocking Future Security Through Neurodiversity

The Power of Neurodiversity: Shaping the Future of Cybersecurity In today's ever-evolving cybersecurity landscape, the push for innovation and resilience has never been more critical....

Survey by Keeper Security reveals tech tools proliferation causing cybersecurity professionals to feel overwhelmed

Research on the Growing Complexity of Cybersecurity Solutions and the Need for Platform Consolidation A recent study conducted by Keeper Security, a prominent provider of...

The Quietly Sabotaging Power of the ‘Sleepy Pickle’ Exploit on ML Models

Malicious Code Injection into Machine Learning Models: The Sleepy Pickle Attack The manipulation of machine learning (ML) models through the use of malicious code injected...

5 Key Questions CISOs Need to Consider When Assessing Cyber Resilience

Improving Cyber Resilience: Top 5 Questions CISOs Should Consider When cybersecurity experts talk about cyber resiliency, they’re talking about the ability to effectively respond to...

Monti Ransomware Acquired by New Owners, Tease Future Plans

New Ownership of Monti Ransomware Group Sparks Speculation and Concern The notorious Monti ransomware has undergone a significant shift in ownership, signaling a new phase...

AdaCore’s research demonstrates innovative approach to achieving ‘Security by Default’ – Intelligent CISO

AdaCore's Research on Security-Enhanced Embedded Real-Time Systems and Arm's Morello CHERI ISA Extensions AdaCore, a leader in software development and security solutions, has unveiled groundbreaking...

Authorities and Companies Strengthen Cybersecurity Measures for Hajj Season

Cybersecurity Challenges During the Hajj Season: Increased Threats and Reduced Vigilance The final month of the Islamic calendar, Dhu al-Hijjah, began on June 7, signaling...

Recent articles