All Cyber Threat Intelligence (CTI) articles – Page 6
-
WebinarAgile Crypto and the Quantum Threat
As the reality of quantum computing approaches, companies and other organizations need to stay one step ahead of the potential computational power that could render today’s encryption algorithms obsolete.
-
NewsHackers access live feeds ‘from 150,000 surveillance cameras’
A group of hackers says it has breached security systems and viewed live feeds from 150,000 surveillance cameras supplied by Verkada to general and psychiatric hospitals, women’s health clinics, police stations, prisons, schools and companies, including car maker Tesla and software provider Cloudflare.
-
BlogWhat makes us human: countering the accidental insider cyber threat
Everybody makes mistakes in the workplace and sometimes this can lead to sensitive information being put at risk. Philip Bridge discusses how to mitigate against these risks.
-
NewsOxfam Australia probes potential hack
The Australian arm of charity Oxfam is investigating a potential data breach.
-
NewsThousands of Australians remain unaware cyber attack affected them
Service NSW has been unable to contact between 20% and 30% of the 104,000 people whose data was compromised in a breach last March, a Parliamentary inquiry was told.
-
NewsHealth insurer fined $5.1m for data breach affecting 9m-plus people
Excellus Health Plan of New York state is to pay $5.1m (€4.2m) to the Office for Civil Rights (OCR) in the US and implement a corrective action plan following a data breach.
-
NewsBiden names cybersecurity and privacy chiefs
US President Joe Biden’s choices as secretary of the Department of Homeland Security (DHS) and director of national intelligence (DNI) say they will make bolstering the country’s cybersecurity a priority.
-
ebookNine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security.
-
FeatureIdentifying, verifying and authenticating customers – which tech options will you go for?
Know Your Customer rules are tightening but bank customers increasingly want fast sign-up and quick banking. FinCrime Report looks at some of the identification and verification technologies currently being used to prevent fraud and money laundering in an increasingly complex landscape while ensuring user experience remains positive.
-
WebinarBuilding an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
NewsZerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.
-
ebookThe State of Email Security 2020
Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity.
-
WebinarSolving Your Number One Security Risk
Email has played a growing role in digital transformation during the COVID-19 pandemic, as organisations continue to support large-scale remote working. But it has also introduced risk of accidental and intentional data leakage.
-
ebookImproving cybersecurity for remote working
A migration to mass working from home might have been a trial by fire for many organisations, but IT and security systems should be an enabler of remove working and not an inhibitor.
-
ebookPhishing By Industry 2020 Benchmarking Report
As cybercrime continues to surge, security leaders must understand that there is no such thing as a perfect, fool-proof, impenetrable secure environment.
-
ebookOutbound email security essentials
Practically every organization requires secure method of sending emails and transferring files to customers or other contacts.
-
VideoCyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
VideoFaking It - Combatting Email Impersonation with AI
Hosted by: Mariana Pereira (Director of Email Security Products, Darktrace) Video: Faking It - Combatting Email Impers…
-
VideoAvoiding the Security Dangers with Work From Home (WFH)
As more and more office workers find the new normal to be work from home (WFH) there are challenges and dangers that come into play, with 90+% cyber security attacks beginning with email.
-
VideoHow to Minimise Insider Threats in Cyber Security
Insider threats, whether they are from negligence or those with malicious intent, can pose a significant risk to all organisations. Research from Ponemon Institute reveals that the average cost of insider incidents is almost double the average breach, therefore, companies face a much larger threat from workers than from outside.





