Home Search
phishing - search results
If you're not happy with the results, please do another search
Seven Impactful Cyber-Tech Trends of 2020 and What it Means for 2021
Every year I like to research and commentate on the most impactful security technology and business happenings from the prior year. This year is...
A Look Back at the Top 9 Data Breaches of 2020
At the beginning of the year, people celebrated the turn of the decade and readied themselves to strike off the “Things-to-Do” from their bucket...
Greater Cybersecurity Threat Predictions with a Primer in Machine Learning
With the increased number of cyberattacks, especially in light of the COVID-19 pandemic, the process of manually or semi-automatically receiving cyberthreat alerts that need...
‘DevSecOps’ Mitigates Cybersecurity Risk from Digital Transformation
Achieving customer value with any digital transformation initiative requires an organizational and cultural shift across the enterprise to align people’s efforts with customer priorities....
Leaked Ledger Database Dumped on Raidforums Dark Market
Cryptocurrency wallet manufacturer Ledger is facing the consequences of a data leak on its website, which took place in June 2020. The company recently...
What Edward Snowden Taught Us About Insider Threats
We all know the name, Edward Snowden. Variously described as a whistleblower, hero, or even a traitor, in the security community, he is what...
How Cyberattacks Cause Severe Hazards to Health Care Industry
Cyberattacks on health care organizations have become rampant in 2020. With multiple data breaches and ransomware attacks, the health care providers continued to be...
Insider Threats: A Byproduct of the New Normal
Despite the continuous security improvements, the concern over insider threats seems to be growing for organizations globally. The new distributed working conditions have also...
APTs: The Epidemic That Went Under the Radar
Identifying cyber threats and anomalies is like finding a needle in a haystack. It is safe to say that with advanced persistent threats (APTs)...
Moving from Human Error to Human Firewall
Cybersecurity experienced multiple challenges in 2020. Rapid digitalization and the new normal — work from home — brought new opportunities as well as risks....