Ransomware — Encrypt Your Data Before Others Do
Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A single malicious email, with the sender of the mail disguised as a…
The Safest Ways for Bitcoin Trading
By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd Bitcoin halving event unfolding. There has been unprecedented hype after this news…
The Role of The CFO In Enterprise Cyber Security
By Glenn Murray, CEO at Sapien Cyber Who is responsible for cyber security in your organization? Smart businesses know that it’s not just the IT teams who need to be…
The Fragility of a GPS Centric World and the Importance of eLORAN
By Dan Dickey, President, Continental Electronics Corporation Both the importance of GPS systems and their vulnerability to a cyber incident or attack are well understood. What is less understood is…
Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies continue to skyrocket, organisations are at constant risk. There are many recent…
Why Building Managers Need to Prioritize Cybersecurity
By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things (IoT), buildings have become elaborate networks of software and hardware designed to…
Data Security Must Be a Priority as Employees Quit in Record Numbers
By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5…
Cyber Insurance: What Executives Need to Know Before Obtaining Coverage
By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by…
Understanding Identity Detection and Response
Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might…
Detect Ransomware Data Exfiltration Immediately
By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site workforce has resulted in new security concerns since hackers now have many…
The Cybersecurity Trends You Need to Know About In 2022
By Jamie Wilson, MD & Founder, Cryptoloc Technology Group In 2021, no sector of the Australian economy was safe from cybercrime. From government agencies to family businesses, and every type…
Combining True MDR & SOC for Robust Cybersecurity
By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the cyberthreat landscape is that it is ever evolving. Amid a global pandemic,…