In 2022 Gartner (who else?) coined a new term: Data Security Posture Management (DSPM), a new, data-centric approach that gives security teams full visibility into cloud environments. Through DSPM, security teams can focus on securing the "crown jewels" of their data, not just the castle walls.
Company is a ‘paid informant’ Threads, Meta’s new microblogging platform, could be considered a clear and present danger to women in the US seeking abortions in states where abortion access has been severely restricted. At the same time, it could
In the growing battle against cybercrime, digital identities have become an increasing target for cybercriminals As a result, credential harvesting has emerged as a dangerous security risk.
While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schools where criminals take a break, they’re always on the prowl, looking to exploit any vulnerability. So, as we unwind during
When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or phone conversations and only two or three people are authorized to use them.
Read our archived Newsletters here.
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party agreements.
The U.S. Health and Human Services breach portal said of the 863 reported breaches to healthcare organizations in 2023, 726 were due to weaknesses in hardware and software infrastructure. Those weaknesses can be in the form of outdated technology and...
A new variant of one of the most infamous malware has been spotted in the wild. No need to panic – if you follow some basic cybersecurity hygiene.
Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.
In today’s world, data is stored and processed across a broad range of locations. That can lead to issues with data governance, says Michael Queenan from Nephos Technologies.
Biometrics is a hub for personal security, identity theft and government surveillance. Protecting that stuff is kind of important. One way to do that is by decentralizing it.
It’s here. We’re proud to announce the very first issue of Cyber Protection Magazine. This first issue is all about protecting the building blocks of a connected world: APIs
With the Data Privacy Day and the data privacy week, the end of January has a particular focus on protecting data. In our special on data privacy, read expert commentary, but also useful knowledge about how your personal data is being used – data collection is not always evil.
One year ago Colonial Pipeline – the largest fuel pipeline in the US – suffered a ransomware attack. Cyber Protection Magazine speaks to three cybersecurity experts to learn what organisations can still do to prevent themselves from becoming the next victim.
The Arqit shareholder fraud lawsuit is pulling back the curtain on the Quantum computing industry. Before it’s over we may see how much is FUD, snake oil and legitimate.
Cyberattacks have become so prominent in the industry that organizations are now realising the need to have special task forces to stop such occurrences. But the truth is they are inevitable.
Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.
Cybersecurity is a mystery to most people and organizations and the industry isn’t very helpful in clearing that up. Zero Trust (ZT) is a good first step but it, too, is a black hole of confusing information. But there are some individuals that are blazing a trail to ZT.