My Child Wants a Phone. Should I Say ‘Yes’?
I can remember so clearly the day I got my first mobile phone. I was 21, had just finished university and was beyond excited at...
New open-source tool tackles pesky access denial messages in AWS
Administrators befuddled by AWS access-denied messages will welcome a new open-source tool announced Thursday by cloud infrastructure security company Ermetic. The Access Undenied tool analyzes...
Malware detections surge from “COVID Bounce”
After a pandemic lull in 2020, malware aimed at individuals and organizations surged in 2021, according to a report released last week by cybersecurity software...
Estonian Gets 66 Months for Ransomware Conspiracy
Man worked for DirectConnection cybercrime forum Read More
Formulating proper data destruction policies to reduce data breach risks
This blog was written by an independent guest blogger. As Morgan Stanley Bank now knows, ignoring certified data destruction policies can be disastrous. The bank...
Use zero trust to fight network technical debt
Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing...
Ransomware Attacks Soar by 100% in 2021
Reports to ICO top 600 in just a year Read More
5 old social engineering tricks employees still fall for, and 4 new gotchas
Blame it on pandemic fatigue, remote work or just too much information, but employees appear to be lowering their guard when it comes to detecting...
What can March Madness and 538 teach us about cybersecurity risk?
I love this time of year, with March Madness excitement in the air and my Notre Dame Fighting Irish still in the tournament (as of...
One in 10 UK Staff Circumvent Corporate Security
Cisco warns of awareness gap among hybrid workers Read More
