CISOMAG
Act Sooner to Prepare for the Increasing and Emerging Security Challenges
Ransomware attacks are growing in sophistication, with threat actors employing new technologies and affiliate models. Last year saw new models like Ransomware as a...
89% of Organizations Are Non-compliant With CCPA Law
Data regulations and privacy laws will go in vain if users and organizations do not obey them. Recent research from Cytrio, a data privacy...
Avoid Negotiating with Extortioners and Implement Solutions for Recovery and Resilience
Once impacted by ransomware and other attacks, organizations spend a lot of time and money trying to recover systems. Many negotiate with attackers and...
Global Affairs Canada Hit by Cyberattack
Unknown cybercriminals targeted Canada’s foreign ministry Global Affairs Canada (GAC), in a cyberattack. The incidents affected certain critical services and disrupted some online services...
What is DNS Tunneling and How is it Prevented?
Hacker intrusions on organizations’ Domain Name Systems (DNS) have become prevalent in recent times. According to the 2021 Global DNS Threat Report from network security automation...
Shifting from a Reactive to a Proactive Cybersecurity Paradigm
For too long organizations have taken a reactive approach to dealing with threats and breaches. Incident reporting and incident response have been slack. But...
Over Half of Medical IoT Devices Found Vulnerable to Cyberattacks
After a year of unprecedented cyberattacks on several hospitals and medical centers across the globe, the health care sector has become a primary target...
Data Privacy Week: The 3 Ps Vital to Enhancing Your Online...
With cybersecurity awareness being a primary topic for security leaders, Data Privacy Week (January 24-28) is a good time to reflect on the importance of data...
Countries Now See Cyberspace as a Legitimate Realm to Create Strategic...
More countries are now leveraging the cyberspace in warfare and you can see that with the most current news (the Russia-Ukraine conflict). This year...
40 Billion User Records Exposed Globally in 2021
Cybercriminals often exploit leaked/stolen sensitive user information to perform various cyberattacks, including phishing and identity theft. The rising information leaks on dark web forums...