Formulating proper data destruction policies to reduce data breach risks
This blog was written by an independent guest blogger. As Morgan Stanley Bank now knows, ignoring certified data destruction policies can be disastrous. The bank...
Use zero trust to fight network technical debt
Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing...
Ransomware Attacks Soar by 100% in 2021
Reports to ICO top 600 in just a year Read More
5 old social engineering tricks employees still fall for, and 4 new gotchas
Blame it on pandemic fatigue, remote work or just too much information, but employees appear to be lowering their guard when it comes to detecting...
What can March Madness and 538 teach us about cybersecurity risk?
I love this time of year, with March Madness excitement in the air and my Notre Dame Fighting Irish still in the tournament (as of...
One in 10 UK Staff Circumvent Corporate Security
Cisco warns of awareness gap among hybrid workers Read More
Man-in-the-middle (MitM) attack definition and examples
What is a man-in-the-middle-attack? A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login...
Friday Squid Blogging: Unexpectedly Low Squid Population in the Arctic
Research: Abstract: The retreating ice cover of the Central Arctic Ocean (CAO) fuels speculations on future fisheries. However, very little is known about the existence...
Optimistic father of LAPSUS$ hacking suspect says he’s going to try to stop him using computers
British police arrested seven people earlier this week in relation to a wave of attacks launched by the LAPSUS$ hacking group, against firms such as...
Senate Committee Questions Pentagon’s Information Restrictions
Panel queries whether Pentagon is abusing new data protection designation to keep info from public Read More