Thursday, February 22, 2024
Home Guest Author

Guest Author

threat actors

Expect AI to be a tool and a target for threat...

It’s been another 12 months full of incident in cybersecurity. But for business and IT leaders, the hard work never stops, says Bharat Mistry,...

400% Growth in IoT Malware Attacks: Where Organizations are Lacking Robust...

IoT (Internet of Things) and OT (Operational Technology) have transformed how IT teams interact with devices via the Internet. While offering efficiency, insights, and...
How cyber skills shortages are leaving businesses vulnerable post-attack

How cyber skills shortages are leaving businesses vulnerable post-attack

Cyber security is as different as night and day from what it was a few years ago. From artificial intelligence and machine learning to behavioral...
How Complacency Puts You at Risk of Phishing

How Complacency Puts You at Risk of Phishing

Author: Joey Stanford, VP of Privacy & Security at Platform.sh Businesses cannot afford to underestimate the threat of phishing and must have the proper protections...
Will the Insider Threat Intensify in Tough Economic Times?

Will the Insider Threat Intensify in Tough Economic Times?

Author: Tim Wallen, Regional Director, UKI & BeNeLux, Logpoint The newest economic downturn will increase the likelihood that employees will ask for pay raises as...
Security Strategies to Truly Evolve with The Business

Security Strategies to Truly Evolve with The Business

Author: Mark Guntrip, Senior Director, Cybersecurity Strategy, Menlo Security It wasn’t until recently that the C-suite could have long discussions surrounding technology solutions and strategies...
Shreyans Mehta

Are APIs Overexposed and Under Protected?

Author: Shreyans Mehta, Co-Founder & CTO, at Cequence Security Application Programming Interfaces (APIs) are the building blocks upon which many of the digital products and services...
The Genesis Market Your Users Credentials Are Being Bought and Sold What Does That Mean for You-03

The Genesis Market: Your Users’ Credentials Are Being Bought and Sold—What...

By Matthew Gracey-McMinn, Head of Threat Research at Netacea "Combo lists" of usernames and passwords leaked in data breaches are widely available on the darknet...
Ekaterina Khrustaleva-03

The Growing Cost of Cybercrime: Why Organizations should Invest in Cybersecurity

By Ekaterina Khrustaleva, Chief Operating Officer at ImmuniWeb 2021 was a very stressful year for enterprises and government organizations alike due to an increase in...
Phil Robinson

Automated Red Teaming: The Pros and Cons

Phil Robinson, Principal Security Consultant and Founder of Prism Infosec Much has been made over the potential benefits of Continuous Automated Red Teaming (CART) over...

Latest posts