Until recently, network and security teams could go about their business completely effectively with little requirement for anything more than a light-touch partnership. If network teams are responsible for the roads upon which business data travels, then security teams...
Chief Information Security Officers (CISOs) are an essential pillar of an organization’s defense, and they must account for a lot. Especially for new CISOs, this can be a daunting task. The first 90 days for a new CISO are...
Cloud computing is transforming digital and IT infrastructure at an astounding pace. The pandemic and changing business models have prompted many businesses to migrate their digital operations and storage to the cloud. Today, it is common practice for an...
Digital forensic investigators play an essential role in solving computer-based crimes. A sub-division of forensic science, digital forensics is alternatively known as computer forensics.
With the widespread use of web applications for banking, transactions, and other services, the pandemic-induced remote...
With rising state-sponsored ransomware operators and attacks becoming widespread, the Australian government has announced a Ransomware Action Plan to tackle the rising cyberthreats. The government is also collaborating with international and business partners to protect Australians against global ransomware...
Over the past few weeks, several cases of lost crypto wallets have been reported and tweeted on social media platforms. Users have been complaining about zero balance in their crypto wallets; a result of accepting a gift on the...
As announced earlier, the Biden administration has initiated the virtual Counter-Ransomware Initiative meetings joined by ministers and senior officials from over 30 countries to address the growing ransomware landscape. The two-day Counter-Ransomware Initiative meetings will discuss the efforts to improve...
Ransomware has become synonymous with cyberattacks in the last two years and is single-handedly driving conversations and investments in the cybersecurity domain. Organizations that weren’t taking cybersecurity seriously, now have their boards talking about ransomware threats and asking about...
Indian organizations have become a primary target of various cyberattacks. Several state-sponsored malware campaigns are making rounds to compromise critical infrastructures across multiple sectors in the country. As the government of India focuses on acquiring advanced technologies to defend...
Apple has released a security update iOS 15.0.2 and iPad OS 15.0.2 to fix a zero-day vulnerability that is actively exploited in attacks targeting iPhones and iPads.
The vulnerability, tracked as CVE-2021-30883, allows an application to execute commands on vulnerable devices with...