Focus Social Engineering – building the security mindset

If you look at the cybersecurity industry, sophisticated attacks are often matched by an equally sophisticated solution. However, those attacks and their solutions can only be understood by experts and are sometimes almost hypothetical.
 
On the other hand, studies still show that there is one basic attack vector we all should take care of better: people, i.e. humans.
Social Engineering attacks are not only common, but on the rise. Which makes sense, since it is the easiest vector to attack. In our special we talk about what social engineering is, its most common forms and how to counter it by raising security awareness.

Defense Against the AI Arts

The rise of generative AI products for commercial use is probably the fastest and most controversial of any technological advance in history.  Perhaps, as a

Read more...
a group of white robots sitting on top of laptops

Are Unparalleled AI Deployments Outpacing Cybersecurity Capabilities?

There is a growing concern that the increasing use of AI could create a tipping point where the technology grows and permeates our personal lives and businesses rapidly, building upon itself while cyber protections are still catching up. 

Read more...

The Security Benefits and Risks of AI for SAP

SAP is no stranger to harnessing the power of AI. But what does AI mean for SAP Security?

Read more...

Cybersecurity in the Age of GenAI: Battling the Threat of Human Trafficking

In the vast landscape of the digital world, the ease of traffickers to reach and manipulate future victims is unprecedented. With the emergence of Generative Artificial Intelligence (GenAI), the risks associated with these deceitful tactics have taken on a new dimension

Read more...

Das Sicherheitskonzept Zero Trust senkt das Risiko erfolgreicher Cyberangriffe auf IT-Infrastrukturen. Dennoch tun sich viele Unternehmen nach wie vor schwer mit einer erfolgreichen Implementierung. Denn:

Read more...

The topic of phishing is ubiquitous and has been a major problem in the IT security industry for years. What makes phishing so dangerous? It’s

Read more...
a pile of gold bitcoins sitting on top of each other

Emerging Cryptocurrency Scams: Red Flags and Prevention

With the rise in popularity of cryptocurrencies, there has also been an alarming increase in cryptocurrency scams that target unsuspecting investors.

Read more...
woman in black shirt sitting beside black flat screen computer monitor

How Your Cybersecurity Strategy Can Combat Fake New

Fake news is a more significant threat to cybersecurity than most people realize, therefore it’s essential to be aware of how one can certify a news story’s validity online.

Read more...

Ransomware: How to Prevent and Recover From an Attack

Ransomware attacks have cost victims millions upon millions of dollars, and these attacks are increasing at an alarming rate. This article will explore effective strategies to prevent and recover from these ambushes.

Read more...
subscribe, registration, signup

Credential Harvesting: Understanding and Combating the Threat

In the growing battle against cybercrime, digital identities have become an increasing target for cybercriminals As a result, credential harvesting has emerged as a dangerous security risk.

Read more...
Who is watching you work?

Bolstering Workforce Security During Summer Holidays

While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schools where criminals take a break,

Read more...
lighted red light

The Double-Edged Sword of AI & Cybersecurity

The benefits of AI in cybersecurity are significant, as it has the power to improve automated security efforts and reduce human error. However, AI can also open the door for adversaries to develop even more advanced cyber-attacks

Read more...
Free stock photo of adult, antivirus, architecture

Phishing Kits: the new frontier of hacker attacks

Phishing kits are ready-to-deploy packages, making cyber attacks easy. Awareness can help protect against phishing attacks.

Read more...

Here’s to a New Password-Less Day!

It’s the tenth anniversary of World Password Day which means that there’s going to be an avalanche of well-intentioned advice this week about how to make passwords more secure. The problem is that passwords are never going to be secure.

Read more...

World Password Day 2023: Simple Habits To Protect Your Data

World Password Day reminds businesses that water-tight password security needs to be prioritised. Companies must take steps like educating staff and using new technologies to avoid serious data breaches.

Read more...

The Looming Identity Crisis

Rohit Ghai, CEO of RSA Security

Read more...

Getting a handle on generative AI, before it gets a handle on us

No model if you stop at one and two is of any value unless it can sort out whether the information sources that it’s actually using are reliable, reputable, and informative to the question.

Read more...
eye, iris, biometrics

Is biometric technology secure? Exploring two scenarios

80% of computer hacks and cyber-crimes have been a result of passwords being compromised. Biometric technology ca be a solution, but it’s not a one-size-fits-all approach

Read more...
a computer screen with the word tiktok on it

What’s up with TikTok

TikTok is like a Dickens novel. It’s the best of apps. It’s the worst of apps. There seems to be no in-between. Over the next few weeks and maybe months, we are going to dig into the controversy and find the truth that’s somewhere in the middle. We are going to find out just what’s up with TikTok.

Read more...

Leave a Reply

Your email address will not be published. Required fields are marked *