All Cyber Threat Intelligence (CTI) articles – Page 3
-
WebinarCybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
WebinarConducting Investigations in a Zero-Trust Environment
Every day, organisations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and Government agencies.
-
WebinarDriving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
VideoPreventing Supply Chain Attacks: Best Practice
PrivSec Third-Party Risk will explore the ongoing threat of supply chain attacks and provide actionable advice on reducing your risk exposure.
-
FeatureMeet the Expert: Vincent D’Angelo will speak at PrivSec Focus: Third-Party Risk
We are delighted to announce that digital business expert, Vincent D’Angelo is to speak at PrivSec Focus: Third-Party Risk.
-
NewsWorker behaviours in finance threaten industry cybersecurity
The pandemic has forced digital transformation like never before, making the balancing act between security and employee experience more important than ever.
-
NewsGerman users of Russia’s Kaspersky anti-virus software issued hack warning
Users of Kaspersky Lab in Germany have been issued with warnings about the technology’s safety by Germany’s cyber security agency, the BSI, which says the Moscow-based antivirus software may be at serious risk of cyberattack.
-
OpinionWhy security teams must have access to multiple data sources when launching investigations
Configuration management databases (CMDBs) are great tools for storing and managing information about hardware and software configuration items that are needed to provide a service, but they are not designed to be asset management tools. Critically they often fail to provide the requisite information and context during investigations.
-
NewsCyberattacks intensify on Ukrainian websites
A Kyiv-based cyber agency has described how Ukrainian websites have come under relentless cyberattack from Russian hackers since Vladimir Putin began the invasion of Ukraine at the end of last month.
-
NewsExploration of cyber insurance claims comes through new treatise
As the cyber insurance landscape continues to evolve rapidly, a new treatise is giving experts fresh analysis and legal advice to help organisations bolster their defences against online threats.
-
NewsMalware pandemic shows no signs of slowing down through 2022
Trojan viruses may have been identified as one of our chief threats to consumers through 2021, but experts say the last 12 months has also seen a significant rise in crypto-jacking and data theft.
-
NewsCybersecurity breaches reported more on a Friday
Fresh insight into growing cybersecurity and data protection trends reveals that most potential data breach incidents are reported at the end of the week.
-
NewsData privacy urgency demands greater C-suite engagement
Persistently low engagement on the part of the IT/C-suite is exposing organisations and businesses to unacceptable levels of cyber-risk, and may negatively impact investments, a new report finds.
-
WebinarThe CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
Watch this session, The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like with OneTrust’s GRC Offering Lead. Gain insight on why more companies are naming chief trust officers, creating formalized trust initiatives, and measuring trust as a metric for themselves and their business partners.
-
NewsLast year’s cyberattack on Russia lasted three months
Fresh evidence has come to light suggesting that a recent cyberattack campaign leveraged against the Russian state continued for far longer than was initially thought.
-
VideoDeep-Sea Phishing: Why is Phishing Gaining Sophistication and What Can Businesses Do?
This panel will explore these terms, why phishing is becoming more sophisticated, and what businesses can do to mitigate and prevent phishing attacks from bottom to top.
-
VideoSecuring Your Supply Chain: Ransomware: Why a Holistic Approach to Vulnerability Management Works Best
PrivSec Global will explore the elements of holistic vulnerability management and consider how it can help your organisation’s resilience against ransomware.
-
VideoThe Global Cyber-Pandemic; Organisational Cyber-Resilience: Readiness, Details and Tactics
This panel will explore readiness, details and tactics, discussing the five T’s set out by the World Economic Forum: Talent and Planning, Technology and InfoSec governance, Training and communication, Technology tools and Triangulation and continuous improvement.
-
NewsNew partnership in Ghana shows the way for cybersecurity in Africa
A new collaboration between leading African security organisations is advancing cybersecurity skills and technology standards to offer greater protection from emerging digital threats.
-
WebinarNot All Assurances are Created Equal – Assessed Entities and Relying Parties Beware!
With the cyber threat landscape constantly evolving, and the number and complexity of business-vendor relationships continuously growing, there is an increasing market need for reliable assurances.


