
- December 01, 2022
- Michelle Davidson
7 Cybersecurity Predictions and Trends for 2023
Over the last few years, with the advances in technology, conversations around cybersecurity have intensified. Here are seven emerging trends for…
Over the last few years, with the advances in technology, conversations around cybersecurity have intensified. Here are seven emerging trends for…
Through new standards and proposed legislation we will see connected devices become more secure and resilient to cybercrime. Learn more
Apple introduces advanced data protection for iCloud, Chinese hackers stole U.S. COVID relief funds, Rackspace was hit by a ransomware attack and…
Security cameras can play an important part in the continuity planning process. Footage of activity within a business provides an invaluable source of information that can be used to identify and…
New details emerge on China's colossal data breach, NIST announces four candidates for post-quantum cryptography algorithms, the most dangerous software weaknesses of 2022
TSA to change cybersecurity rules for pipelines, Data breach leaks names, addresses of every concealed carry permit holder in California
Data access comes with a greater need to govern our personal or sensitive data, particularly when it comes to the businesses that we operate. To improve information security, data-driven organizations…
Belgian, Dutch Police Dismantle Cybercrime Group, Biden signs two cybersecurity bills, US Microsoft 365 & Outlook customers targeted by voicemail-themed phishing
Most attacks are intended toward the most crucial asset of businesses: data. The wave of cyberthreats forced organizations to set up cybersecurity to survive.
While there are many different steps that can be taken to secure a wireless network, these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors.
Ransomware gets into Foxconn's Mexico plant, the FBI says hackers targeted Boston Children's Hospital last year, a ransomware attack sends a US county back to 1977
There are many steps companies can take to secure their Kubernetes workloads. One best practice that Kubernetes itself recommends is the extensive use of transport layer security (TLS).
When it comes to managing employee documents, there are a few things that HR departments need to keep in mind. After all, these documents often contain sensitive information that needs to be…
A cyberattack attack at Indian airlines SpiceJet, US car manufacturer GM was the victim of a credential stuffing attack last month, and relax, it’s only the data of 22.5 million Malaysians that's been…
Despite its massive attack on Costa Rica, Conti says it's shutting down, an attack leads to a huge sales loss at an ecommerce company, a doctor becomes a hacker
Remote working offers flexibility, but it increases the challenge of protecting companies’ applications and data. Read tips on how to educate employees about cybersecurity.
Costa Rica is reeling from a ransomware attack, the U.S. CISA Chief talks about future tech challenges, Russian hackers issue a chilling warning to the UK
Quantum computers are advancing quickly. Posing a great risk in the future as they will allow attackers to overcome today’s strongest encryption methods. Read how companies can prepare against this…