How can we harness human bias to have a more positive impact on cybersecurity awareness?
Dr. Jessica Barker, Co-CEO of Cygenta, follows her passion of positively influencing cybersecurity awareness, behaviours and culture in organisations around the world. Dr. …
HECVAT toolkit helps higher education institutions assess cloud adoption risks
Higher education institutions are increasingly adopting cloud-based solutions in order to lower costs, improve performance and productivity, and increase flexibility and …
Malware and ransomware attack volume down due to more targeted attacks
Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, …
Lack of .GOV validation and HTTPS leaves states susceptible to voter disinformation campaigns
There’s a severe lack of U.S. government .GOV validation and HTTPS encryption among county election websites in 13 states projected to be critical in the 2020 U.S. …
Mobile data roaming traffic generated by consumer and IoT devices expected to surge
Mobile data roaming traffic generated by consumer and IoT devices reached 737 Petabytes in 2019, according to Kaleido Intelligence. This is forecast to reach 2,000 Petabytes …
New ransomware targets industrial control systems
With the ransomware threat is surging unstoppably in the last few years, it was just a matter of time until ICS-specific ransomware became a reality. Researchers from various …
State-sponsored actors may have abused Twitter API to de-anonymize users
A Twitter API that’s intended to help new account holders find people they may already know on Twitter has been abused by known and unknown actors to tie usernames to …
How CISOs can justify cybersecurity purchases
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff …
What makes some organizations more cyber resilient than others?
Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping …
Scientists test forensic methods to acquire data from damaged mobile phones
Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve …
Automation is advancing faster than the enterprise knowledge required to support it
Automation is transforming the enterprise around the globe, directly impacting the bottom line as a result of improved productivity and efficiency, according to UiPath. But …
Wuhan coronavirus exploited to deliver malware, phishing, hoaxes
The Wuhan coronavirus continues to spread and create anxiety across the globe, allowing malicious individuals and groups to exploit the situation to spread fake news, malware …