LockBit has become the most reputable ransomware group in recent times. The method by which they operate differs from other...
The Principle of Least Privilege is one of the longest standing principles of security. People (as well as applications) should only have access to the things they need...
Machines are better at speed and scale than humans. But humans have the edge over machines at thinking outside of the box, using their curiosity and...
According to Menlo Security, Google Chrome users don’t always take time to relaunch browser updates, and some legacy applications don’t support new versions of Chrome. Menlo Labs...
Businesses today have been forced to rapidly transform how work is done, with new interconnectivity that enables employees to work from home. COVID-19 didn’t start the remote...
In the documentary The Last Dance, ESPN took us on a trip down memory lane by exploring Michael Jordan’s final season with the Chicago Bulls. With six...
In the wake of Schrems II, the EDPB’s much-anticipated recommendations provide extensive guidance on supplementary measures parties can use to legally transfer data out of the...
When it comes to cybersecurity, a multifaceted approach is needed for resilience. In any resilience model, you have a primary site, a secondary site and so...
SailPoint Technologies Holdings, Inc. released an international study revealing security pitfalls that stem from remote work. The human workforce always comes with a certain security risk level,...
Today’s cyber environment is one of rapid and constant change. Stepping up in technological savvy, threat actors are using an arsenal of new and sophisticated techniques...
Honeywell and Nozomi Networks have announced a cybersecurity partnership to deliver more comprehensive, end-to-end cybersecurity for Operational Technology (OT) environments. The partnership combines Nozomi Networks’ industry-leading OT & Internet of Things...
Recent Comments