Like beauty, risk is in the eye of the beholder, and business risk is no exception. While some organizations perceive risk as a potential hazard or negative consequence of uncertainty that should be avoided at all costs, others recognize...
Sectona has been disrupting privilege access management with a global focus. The company helps enterprises mitigate the risk of targeted attacks to privileged accounts spread across data centers and the cloud. It delivers integrated privilege management components for securing...
Identifying and preventing fraudulent apps have become a rising challenge for companies globally. Recently Apple disclosed that, in 2020, it prevented nearly 1 million vulnerable apps from entering its App Store. The iPhone maker also rejected over 215,000 apps...
The U.S. has been under cyberattacks for over a year now. It started with a persistent SolarWinds attack, which was discovered in December 2020 and was followed by the Accellion and Microsoft Exchange Servers hack. However, the last straw...
Microsoft discovered a spear-phishing campaign in the wild targeting airline, cargo, and travel industries with multiple Remote Access Trojans (RATs). The technology giant stated that attackers distributed malware payloads via phishing emails imitating legitimate businesses with malicious image and...
As COVID-19 drove many employees into remote work, IT departments rushed to get everyone online with access to the data and applications they needed to be productive. Chief information security officers (CISOs), however, were nervous. They understood many home...
International law enforcement authorities and the cybersecurity community are joining hands to thwart evolving cyberattacks from various threat actors operating across the globe. Recently, the FBI and the Australian Cyber Security Center (ACSC) warned about the ongoing Avaddon ransomware campaign targeting manufacturers,...
On May 6, Twitter added a new feature, the Tip Jar. The intent behind this innovation, as Twitter says, “is to support voices of creators, journalists, experts, and nonprofits.” However, within hours of the launch, security experts raised concerns...
Cybercriminals often change their hacking tactics to get access to users’ sensitive information. Earlier ransomware operators only focused on encrypting critical systems and demand ransom to decrypt them. But now several some of these operators are leveraging new tactics...
The time has long passed for CISOs and other security leaders to shift their perception regarding cybersecurity compliance assessments. These assessments have traditionally been viewed as nuances that you have to undertake because a prospective customer or other interested...














