Cyber Insurance for Health Care Organizations
Cyberattacks are dangerous for any organization. Health care organizations can be particularly vulnerable, however, because breaches often reveal sensitive patient information and may result...
How U.S. Defense Contractor Electronic Warfare Associates Fell Prey to Phishing
A U.S. government defense contractor, Electronic Warfare Associates (EWA), was a victim of a data breach due to an email phishing incident. Per a...
Why Data Science is Key to Delivering Continuous Authentication
Back when security threats were relatively unsophisticated, understanding threats was easier. Attackers often gained access by generating or guessing passwords. Passwords were drilled into...
How to Become a Successful Digital Forensic Investigator?
Digital forensic investigators play an essential role in solving computer-based crimes. A sub-division of forensic science, digital forensics is alternatively known as computer forensics.
With...
Ransomware – What is new?
Executives are worried. They see organizations crippled by ransomware, often for days or weeks, and rumors of multimillion-dollar fines being paid.
By Ian Mann, CEO...
“Zero-Trust Is Not a Product or Solution That Can Be Installed”
Under the prevailing circumstances of the pandemic, IT assets are no longer present behind the safe confines of corporate firewalls. Rather, they are dispersed...
Different Types of Ethical Hackers: White, Black, and Grey Hats Explained
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of...
These are the Top 4 Cybersecurity Skills In-demand in 2021
Amidst growing cybercrime and cyberthreats, it is wise for businesses to hire professionals with cybersecurity skills. The pandemic-induced lockdown has changed the way we...
How to Ensure Data Management Excellence
In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...
“I believe in building products and teams that are obsessed with customer success”
API security has often been a blind spot for enterprises. In fact, it’s very common to see unauthenticated APIs. In most cases, these mostly...