Have I Been Pwned Goes Open Source; Partners with FBI
Compromised credentials pose severe security threats to both organizations and individuals. Attackers often leverage stolen/leaked passwords in brute force attacks to compromise user accounts....
Endpoint Security: Protecting Businesses and Remote Workforce in the New Reality
Market research institutions and analysts have been predicting the rise of endpoints for years. Analysts project the rise of IoT devices due to 5G...
Has Your Organization Addressed These 3 Common Employee Habits?
Cybersecurity risks are a major concern for most organizations globally. Cyberattacks are often seen as threats from outside, but sometimes inadvertent actions from employees...
NASA Plans to Realign its Cybersecurity Strategy
In a recently released audit report, the Office of Inspector General (IG) stated that “attacks on NASA networks are not a new phenomenon.” However,...
Verizon 2021 DBIR: Cyberattacks Continue to Rise During Pandemic
From phishing attacks, identity theft to brand impersonation attacks, cybercriminals leveraged all kinds of attack vectors during the pandemic. This resulted in a huge...
Conti Continues Targeting U.S. Health Care Sector but Acts as a Good Samaritan in...
The Federal Bureau of Investigation (FBI), on May 20, released a “Flash” alert stating that the notorious Conti ransomware gang, which reportedly targeted the...
Corporate Compliance Strategies to Protect Data
The pandemic has pushed the corporate workforce to remote locations, which has resulted in increased risk to corporate data. As corporations rise to the...
U.S. Introduces Security Bills to Secure Critical Infrastructure
Organizations globally continue to suffer cyberthreats from various cybercriminal groups. Most enterprises have increased their cybersecurity budget to boost their security capabilities against evolving...
3 Takeaways from 2020 for CISOs to Guide This Year’s Strategy
Last year cast a shockingly bright spotlight on cybersecurity with the risks that surfaced due to the rise of remote work. The year was...
Japan to Impose Strict Regulations on Private Sector’s Adoption of Foreign Equipment and Technology
Fearing a situation like the Colonial Pipeline-like hack, the Japanese government is set to impose restrictions on the usage of foreign equipment and technology...














