Browsing Category
Cybersecurity
CISA Releases Cybersecurity Toolkit For Healthcare
A leading US cybersecurity agency has published a new set of online resources designed to help IT security leaders in the…
UK Parliament Opens Inquiry into Cyber-Resilience
UK lawmakers have launched an inquiry into the cyber-resilience of critical national infrastructure (CNI), claiming the country is…
Humans Need to Rethink Trust in the Wake of Generative AI
As generative AI rapidly evolves, one of the biggest risks that is being discussed is the potential for the technology to be used…
Stronger Together: Attack Surface Management and Security Validation
By Mike Talon, Director, Cybersecurity Architect, Cymulate
The digital threat landscape is becoming more dangerous with each…
How Cyber Risk Quantification can Help Align CISOs with the Board.
By Lior Bar-Lev, VP Strategy & BizOps, CYE
Recently, the American National Institute for Standards and Technology (NIST)…
How False Positive Rates Impact E-Commerce Conversion Rates: Balancing…
By Benjamin Fabre, CEO & Co-founder, DataDome
In the world of e-commerce, ensuring the security of online transactions is…
Winter Vivern: Zero-Day XSS Exploit Targets Roundcube Servers
ESET Research has discovered a significant cybersecurity threat as the Winter Vivern group exploited a zero-day cross-site…
Seiko “BlackCat” Data Breach: 60,000 Records on the Line
Seiko Group Corporation (SGC) has recently confirmed the extent of a data breach that it disclosed initially in August. The…
When it Comes to ZTNA, Buyer Beware
By Denny LeCompete, CEO, Portnox
With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and…
Closing The Gap: Resolving Human Error in Cloud Security
By Patrick Pocalyko, GM North America, CYREBRO
Cybersecurity technology is critical to securing the cloud but it’s easy to forget…