
I-4 2022 Talk: How to start? Facilitate your business in a quantitative cyber risk program
Here are my session notes for the I-4 2022 conference. Abstract: How to start? Facilitate…
Here are my session notes for the I-4 2022 conference. Abstract: How to start? Facilitate…
The recent executive order will expand what companies must disclose to the government in the…
For every organization, the data in its possession is one of its most valuable assets.…
Ransomware is the most destructive type of cyberattack due to the massive financial losses it…
We’ve all heard the saying, “early detection is key”. This is true in most aspects…
Do you know the coding strategies used by developers? There will be fewer security breaches…
2021 has been a busy year for Kaseya. As the year draws to a close,…
As part of our ongoing blog series on the modern threat landscape, we take a…
Well not quite. It’s sort of but at the same time it’s so much more.…
The basis of every software, application or website is its code. Nowadays, every organization and…
IoT is considered one of the most successful technologies. Continuous development connects millions of smart…
In recent years, cloud computing has grown rapidly. It has completely revolutionized the business world,…
The pandemic has brought new challenges to the world of security threats. At the same…
In today’s world, where virtual lives take precedence over real ones, the only way a…
Teleport will be live on re: Invent from November 30 to December 30. 2. If…
The increasing frequency and scale of data breaches has highlighted the need for organizations to…
Cyber Security Awareness Month in the rear view mirror, but security still front and center…
The growing need for mobility has accelerated the transition of many organizations to wireless networks,…
Ransomware attacks continue to rock organizations across the globe. Of particular concern is that many…
Did you know? According to a Business Standard article, approximately 82% of Indian businesses suffered…
When it comes to cybersecurity, it is not possible to identify the biggest threat to…
Internet fraud happens fast Trademarks are defrauded every day as crowds of counterfeiters create fake…
The use of Azure AD and Microsoft 365 has steadily increased over the past few…
The Colonial Pipeline ransomware attack is potentially one of the worst cyberattacks to take place…
ManageEngine will showcase its suite of IT management solutions at GITEX Technology Week, October 17-21,…
Five worthy readings is a regular column on five remarkable things we discovered while researching…
Business growth can be measured by the performance of the IT infrastructure, which is an…
NOBELIUM is the group behind the SUNBURST backdoor, TEARDROP malware, GoldMax malware and other related…
Microsoft unveiled Windows 11 on June 24, 2021 at its virtual launch event. Although Windows…
A world without Linux is hard to imagine. Every Google search we perform is performed…
This is the last of my three guest blogs as part of our collaboration with…
There are many security information and event management (SIEM) solutions on the market with various…
The COVID-19 pandemic has accelerated the adoption of hybrid workforce in organizations, causing a host…
IT infrastructures are constantly evolving, which means that conventional business processes have become obsolete and…
Five Worthy Readings is a regular column on five remarkable things we discovered in our…
With new technological advancements appearing every day, the supply of and demand for IoT devices…
Ransomware groups have exploited the shift to remote work like no other. Ransomware attacks increased…
Each year, SINET evaluates technologies and products from around the world with hundreds of cybersecurity…
As sysadmins eagerly await a patch for CVE-2021-40444, this month’s Patch Tuesday contains fixes for…
This is the second of three blogs invited as part of our collaboration with Cequence.…
Waterhole Attack: The Attack Vector Used to Target Florida Water Utilities! Do you know that…
Five worthy readings is a regular column on five remarkable things we discovered while researching…
On July 2, 2021, the cybersecurity world woke up with yet another ransomware attack. This…
Did you know that almost 560,000 new malware instances are detected every day? As cybersecurity…
“If you don’t plan, you plan to fail.” -Benjamin Franklin Planning for the operation of…
Digitally connected devices and apps encroach on every aspect of our lives, whether it’s our…
Sisyphus (1548-1549) by Titian I mentioned in a previous blog post that I had just…
Cyber attackers and cyber defenders seem to be using AI (artificial intelligence) and ML (machine…
In recent years, the rise of cybercrime has been in full swing all over the…
What if I don’t cover my hands properly when entering my debit card PIN? Under…
Even if your organization uses top-notch security solutions to keep malicious actors at bay, those…
Cloudflare recently revealed a vulnerability that could have resulted in successful cyberattacks on millions of…
The adoption of new technologies leads to qualitative growth but simultaneously presents high chances of…
Five Worthy Readings is a regular column on five remarkable things we discovered in our…
Over the years, cybersecurity challenges have become more complex and more frequent. But at the…
What if you could improve your daily productivity by knowing your mood hour by hour?…
2020 has seen an increase in the number of organizations adopting remote working to adapt…
In recent years, there has been an increase in cybercrimes targeting Kuwait. The number and…
With the rapid adoption of cloud, IoT, and DevOps automation, the traditional approach of trusting…