Black Friday Fears: Beating Cybercriminals to the Bargains

Each year Black Friday grows in popularity, and Cyber Monday is now a key part of the sales weekend. But, this growth of popularity has sparked the interest of cybercriminals, who are also out to exploit the vast number of people online trying to bag a bargain.

a group of carved pumpkins with glowing faces
 

Navigating the Digital Battleground – Expert Voices on Cybersecurity Awareness Month

As October is coming to an end with eerie Halloween celebrations, we’d like to remind everyone that today also marks the last day of National Cybersecurity Awareness Month.

 

Biden’s EOs on AI is more CYA than action

Nations gather to discuss AI safety

text
 

Why Is Security Technology Not Working?

Our author Wes Kussmaul argues that the failing security industry is not as nefarious as that may make seem. Its participants were set on their dysfunctional path years ago.

Mark Zuckerberg, Elon Musk and Sundar Pichai are the faces of misinformation
  

Opinion: Deprioritize social media for peace

Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups, hostile nation states, and paid political consultants currently makes up the bulk of information that these users call “news.”

  

7 Most Dangerous Cybersecurity Threats

In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at risk. As you navigate the digital world, staying informed about the latest dangers lurking in the shadows is crucial.

  

From Coders to Protectors: Women’s Influence in Cybersecurity

The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.

AI under siege
 

AI is at war with itself

It almost seems that the AI market is an industry at war with itself.

Generative AI security weaknesses
 

Security issues, regulation, reality dull AI hype

In the last year the tech world has seen some spectacular expectation resets on “revolutionary” technology. Social media has gone from a boon to democracy

Sextortion scam
  

Sextortion is criminal, but may not be a crime

“Sextortion” is a popular theme in media and the news, but it may or may not be a big deal. It might not even be a crime depending on where you live. No one can really come up with a consensus about what it is and how widespread it is. It’s even difficult to pin down what constitutes the typical perpetrator of this crime.

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

Two Men Having Conversation Next to Desk in Building
 

The Big Cybersecurity Error Companies Make and Four Steps To Correct It

Staying ahead of complacency requires a multi-faceted approach— there are four steps organizations need to take.

Numbers Projected on Face
 

How the cybersecurity industry has changed with 20 years of Cybersecurity Awareness Month

Every year for the past twenty, October has reminded us about the importance of digital security and empowered everyone to protect their data from digital forms of crime. Towards the end of Cybersecurity Awareness Month we’ll take a look back – and ahead.

Sextortion scam
 

Social engineering criminals are after everyone

It’s not just mega corporations like MGM Grand Entertainment that get targeted by social engineering attacks. In fact, it happens millions of times every year to individuals young and old, rich and poor, well-educated and not.

 

Ten ways to avoid being an online victim

Gabriel Friedlander, founder of Wizer, published the following list recently on Linkedin. While the suggestions are not comprehensive, they do cover a lot of ground in maintaining your personal and small business security.

 

Special Report: Social Engineering and the MGM Grand

In our Special Report, we dig into how social engineering works – and use the MGM breach as an example.

 

Unpacking the 15-min phone call that took down MGM/Caesars

The MGM Grand/Caesar’s breach is the most exhaustively covered cyber event in recent memory. Even the attackers published detailed explanations of how they did it. There was, however, one question still needs answering:

Classified page 5 newspaper selective focus photography

Secure Document Collaboration: Protecting Your Data

With the convenience of online collaboration comes the responsibility to ensure the security of sensitive information – first and foremost when it comes to something as basic as filesharing

Navigating the Future of Generative AI

When it comes to generative artificial intelligence, the genie is out of the bottle. This has increased the urgency for guidance, training, and education.

Podcast: Defense against the AI Arts

The rise of generative AI products for commercial use is probably the fastest and most controversial of any technological advance in recent history. Governments are

Tips for Navigating the Cybersecurity Landscape

In the immortal words of Ferris Buller, “life moves pretty fast.” So does Cybersecurity. A recently published guide from OCEG will help you navigate this landscape.

API Security, AI and the Consolidation of the Cybersecurity Industry

We’ve had the chance to interview Andy Grolnick, CEO of Graylog, and asked a few questions about API security, AI and the cybersecurity market consolidation.