Infostealers: What are they & far-reaching effects on data security
By Hendrik De Bruin, Security Engineer, Check Point Software Technologies. Infostealers…ransomware’s lesser-known cousin When it comes to malware, ransomware usually…
By Hendrik De Bruin, Security Engineer, Check Point Software Technologies. Infostealers…ransomware’s lesser-known cousin When it comes to malware, ransomware usually…
EXECUTIVE SUMMARY: What is the word ‘agile’ spelled backwards? CISO. (Just kidding, but it should be) As we enter July…
Discover how MFA failures are contributing to a 500% surge in ransomware costs and learn how adopting Passkeys can enhance…
By Ulrica de Fort-Menares, Vice President of Product Management for Infrastructure Assurance at BlueCat Networks Artificial intelligence (AI) has the…
Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations…
AI in Action: Real-World Breakthroughs and Innovations Attending the RSA Conference for the first time was an incredible experience! Ever…
Expert insight from a data privacy trainer and DPO “Organisations tend to overcomplicate GDPR compliance.” That’s what data privacy trainer…
EXECUTIVE SUMMARY: Until recently, the signs of a phishing scam were relatively obvious – typos, “dear”, clumsy grammar, a cloying…
Mark Dargin is an experienced security and network architect/leader. He is a Senior Strategic Security Advisor, advising Fortune 500 organizations…
EXECUTIVE SUMMARY: A newly discovered jailbreak – also known as a direct prompt injection attack – called Skeleton Key, affects…