
Should You Be Using an Electronic Signature
If you’ve submitted documents online in the past several years, you may have signed your name electronically. This practice has become increasingly common as businesses gradually move their recordkeeping processes online. That said, electronic signatures (e-signatures) aren’t a match for every business.

Deepfake Technology Is a Rising Cyberthreat
More artificial intelligence (AI) and machine learning (ML) use cases are emerging, and cybercriminals are leveraging these technologies to create highly sophisticated attacks. Cyberattack detection and prevention can be more challenging for individuals and businesses when hackers use innovative methods.
Cybersecurity professionals are already grappling with data breaches, ransomware attacks and phishing scams. Recently, another growing threat has kept them awake at night — the rise of the deepfake and the challenge of spotting one in an increasingly digital world.
Here’s more on the rapid advancement of deepfake technology, the cybersecurity implications of these attacks and what the future holds.

The Expansion of Malware to the Cloud
As more organizations move their assets to the cloud, malware distributors are turning their attention to the cloud as well. In this blog, we will discuss the main malware types you may encounter in your cloud with examples and ways to detect and protect your cloud from them.
But first, how does malware find its way into cloud assets?

OT/ICS Security Training
This article is inspired by a recent article on the Computerworld site for Denmark, where one of the CISO’s for a big energy company lamented the lack of formal skills in the cybersecurity community on the security requirements for Operational Technology (OT) and Industrial Control Systems (ICS). This triggered light research from me on the options out there for relevant trainings and certifications.

It’s Time to Secure the Water Sector from Cyber Threats
he Biden administration is reportedly considering a first-ever integrated action plan for global water security, linking global access to clean, reliable water to U.S. national security for the first time. At home, the linkage between national security and security of the water and wastewater sector is self-evident by its very definition as critical infrastructure. Yet decades of chronic underinvestment and under-resourcing of federal support to the industry has left this life-supporting and life-sustaining infrastructure vulnerable to cyber threats.