Regulatory compliance and cybersecurity improvement are not two sides of the same coin: they are distinct pillars that demand specialized attention. Achieving compliance does not create an impenetrable...
Network attacks (IPS detections) have remained relatively flat over the last three quarters, technically down a bit more than 3%, according to WatchGuard. “Organisations need to...
Threat hunting Tools are essential for undetected cybersecurity threats hiding in the network, databases, and endpoints. The approach requires researching deeply into the environment to locate...
VirusTotal has published a cheat sheet to help researchers create queries leading to more specific results from the malware intelligence platform. File search modifiers can assist...
https://player.vimeo.com/video/734653747?h=2196cbc3d8&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In this Help Net Security video, John deCraen, Associate Managing Director at Kroll, talks about risk astute leadership and the leveraging of threat intelligence to inform...
Reactive cyber defense is a losing strategy. It’s something that’s been tolerated for many decades, but isn’t it more cost-effective, better for the brand, and more...
As ransomware attacks continue to increase and cybercriminals are becoming more sophisticated, the federal government has implemented a more proactive approach when it comes to cybersecurity....
Cybersecurity is one of the most dynamic fields of law. Long gone are the days when organizations could rely entirely on defensive measures within their own...
The world is shaken by different new crises and cyber events every day. All sectors are affected by the events, either in terms of production, transportation,...
Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these expansions and transitions create...
Recent Comments