News

  • Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago

    PRIVACY PRIVACY Four years’ worth of records were accessed during the data breach Read More

    Read More

  • How to stay ahead of the Cybersecurity labor crisis and keep growing your business

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Cybersecurity is a complex task that is never complete. It’s an ongoing proactive practice of securing, monitoring, and mitigating threats. It’s a constant cycle where threats and vulnerabilities are detected, teams investigate and mitigate any issues, then network cybersecurity systems are reinforced to combat…

    Read More

  • IDaaS explained: How it compares to IAM

    PRIVACY PRIVACY It is often said that identity is the new perimeter in the world of cloud-native ecosystems and zero trust. Identity is inarguably at the center of everything we do in modern systems and it is key to facilitating zero trust architectures and proper access control. That said, running identity and access management (IAM) at…

    Read More

  • Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet

    PRIVACY PRIVACY After declaring cyber-war, Anonymous announced that the official Killnet site was offline Read More

    Read More

  • What is cryptography? How algorithms keep information secret and safe

    PRIVACY PRIVACY Cryptography definition Cryptography is the art of keeping information secure by transforming it into form that unintended recipients cannot understand. In cryptography, an original human readable message, referred to as plaintext, is changed by means of an algorithm, or series of mathematical operations, into something that to an uninformed observer would look like…

    Read More

  • Friday Squid Blogging: Squid Street Art

    PRIVACY PRIVACY Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • The Onion on Google Map Surveillance

    PRIVACY PRIVACY “Google Maps Adds Shortcuts through Houses of People Google Knows Aren’t Home Right Now.” Excellent satire. Read More

    Read More

  • Greenland hit by cyber attack, finds its health service crippled

    PRIVACY PRIVACY For the past week and a half, Greenland’s health service has reportedly been struggling to recover from a cyber attack that has crippled its IT systems, causing long waiting times and forcing doctors to resort to using pen and paper instead of computers. Read more in my article on the Hot for Security…

    Read More

  • Canada bans Huawei, ZTE in 5G networks

    PRIVACY PRIVACY Ottawa government’s move follows similar bans in other English-speaking countries, citing potential security risks to 5G communications networks. Read More

    Read More

  • Defining “Reasonable” Security with a Risk Assessment Method

    PRIVACY PRIVACY Enterprises can use CIS RAM v2.1 for IG3 to demonstrate that a risk is reasonable upon experiencing a breach. Read More

    Read More

News, Advisories and much more

Exit mobile version