Threat Intelligence Led Security Operations
Cybersecurity Magazine
by Tim Manley
1w ago
The cybersecurity landscape is undergoing a rapid and relentless transformation. Traditional, reactive approaches are no longer sufficient to counter the sophisticated and ever-evolving tactics employed by today’s adversaries. In this dynamic environment, organizations must embrace a proactive and intelligence-driven security strategy to effectively mitigate cyber threats and safeguard their critical assets. Sun Tzu, the ancient Chinese military strategist and author of “The Art of War,” famously stated: “If you know the enemy and know yourself, you need not fear the result of a hundred battle ..read more
Visit website
Ransomware Threats and Data Protection Strategies
Cybersecurity Magazine
by Editor's Desk
2w ago
In our interview with Purandar Das, CEO and Co-founder of Sotero, we delved into the pressing issue of ransomware threats and data protection strategies, particularly in critical sectors such as Financial Services and Healthcare/Pharma. Das, an experienced figure in the cybersecurity field, shared his journey and emphasized the paramount importance of security, especially from the perspective of a CEO. We explored the current landscape of ransomware threats, discussing common vulnerabilities exploited by attackers in these industries and the role of data-centric security strategies in mitigati ..read more
Visit website
World Backup Day – is it time to take a step back on backups?
Cybersecurity Magazine
by Editor's Desk
2w ago
World Backup Day has served as a reminder to play it safe with data for more than ten years – but many question whether it has now run its course into redundancy. After all, whilst data protection, security and backup are considered standard practice, the old ‘golden’ 3-2-1 backup rule has become obsolete and many question whether the newer methods are all that more effective.  Combining issues such as data centre outages, misconfigurations, sleeper ransomware and supply chain attacks with the fact that attackers are now actively going after backup systems, arguably backup no longer offer ..read more
Visit website
Cryptographic Solutions for Data Security in Cloud Computing
Cybersecurity Magazine
by Editor's Desk
3w ago
A Run Time Trend-based Comparison of NCS, ERSA, and EHS Abstract: Due to the recent explosion in the amount of data being created by various social media platforms, e-commerce websites, and other businesses, a paradigm shift from on-site data centers to the cloud is required. Concerns about privacy and secrecy have been a major obstacle to the mainstream adoption of cloud computing. The best approach to protect the confidentiality and privacy of cloud data is by using cryptographic techniques. Researchers have developed several cryptographic algorithms, but they all have lengthy, linear, predi ..read more
Visit website
Confidential data should stay… confidential
Cybersecurity Magazine
by Michael Rask Christensen
1M ago
In October 2023 the Copenhagen based chain of real estate agents, EDC, was hit by a ransomware attack. The hackers behind the attack – the Russian group “Black Basta” –demanded a ransom of 6 million US dollars. The criminals stole 2.5 TB of data including thousands of scanned passports, driver licenses and other means of providing identity. About 100,000 social security numbers with accompanying names and addresses was included in the stolen data. The data has now been published because EDC refused to pay the ransom. As ..read more
Visit website
Building Cyber Resilience: Key Trends and Strategies for a Secure Future
Cybersecurity Magazine
by Editor's Desk
1M ago
Join us for an interview with Darren Thomson, Field Chief Technology Officer at Commvault, as we delve into the dynamic realm of cybersecurity. Darren shares insights drawn from his extensive experience in the field, tracing his journey and offering valuable perspectives on emerging trends and strategies. In our conversation, we covered several key cybersecurity topics, including the impact of AI on cybersecurity, the urgent need for a new approach due to the staggering predicted cost of cyber attacks on the global economy the implications of the forthcoming DORA (Digital Operational Resilienc ..read more
Visit website
Why the Cloud Is So Vulnerable to Insider Threats
Cybersecurity Magazine
by Zac Amos
1M ago
Insider threats are becoming just as big of a threat to cloud security as external threats. Whether accidental or on purpose, employees can cause harm to an organization’s data because they have access to sensitive information and systems, making it easier for them to misuse this privilege. As more companies store their data in the cloud, understanding how to prevent cloud insider threats becomes more vital. How Insider Threats in the Cloud Work Insider threats in the cloud occur through individuals within a business who have permission to access its cloud services. These people can be staff ..read more
Visit website
How can internet service providers promote online safety?
Cybersecurity Magazine
by Guy Miller
1M ago
When it comes to internet safety, we all know the dangers of choosing ‘123456’ as a password or clicking links from unrecognised senders. But with online scams becoming increasingly sophisticated, internet service providers (ISPs) have a key role to play in protecting us online.  The latest Ofcom data shows that three-quarters of internet users are confident in spottinga suspicious email. Moreover, six in ten adults can confidently iden ..read more
Visit website
The evolving threat landscape in 2024: AI takes centre stage
Cybersecurity Magazine
by Editor's Desk
1M ago
In 2023, we saw the increasing adoption of AI in both offensive and defensive cybersecurity strategies. In 2024, AI-driven threat actors will become more sophisticated, and organisations will dedicate more resources and AI-driven tactics to stay ahead of these evolving threats.  In this article, researchers from Aqua Nautilus share their views on what we can expect to see in 2024 as AI becomes the profound battleground for cybersecurity. Navigating AI as a double-edged sword Yakir Kadkoda,  ..read more
Visit website
How The EU AI Act Will Impact US Companies
Cybersecurity Magazine
by Dominique Shelton Leipzig
1M ago
I am excited for 2024 and the changes it will bring for U.S. Companies!  The EU AI Act, litigation trends and mitigation discussed below will make a difference for U.S. companies. 1. The EU AI Act is a Significant Development Worthy of Our Attention in the U.S. ASAP. Every U.S. company needs to pay attention. The EU AI act will necessarily transform AI governance for U.S. companies using AI in products and/or services directed to EU residents when those companies become subject to a sweeping set of new governance obligations. Though the Act will not go into effect until two years aft ..read more
Visit website

Follow Cybersecurity Magazine on FeedSpot

Continue with Google
Continue with Apple
OR