Let’s Ease Up on the Cyber Criminal High Tech Hype
A recent article in Bleeping Computer detailed a new cyber attack technique developed by researchers in the UK that uses
Read moreA recent article in Bleeping Computer detailed a new cyber attack technique developed by researchers in the UK that uses
Read moreAbstract: Domain Name System (DNS) is considered a vital service for the internet and network operations, and practically this service is
Read moreCybercriminals are notoriously good at the art of uncovering the paths of least resistance that lead to an organisation’s valuable
Read moreIn this podcast episode, Philippa Jefferies is joined by Alex Leadbeater, Chair of ETSI TC Cyber, David Boswarthick, Director of
Read moreBias in artificial intelligence (AI) is one of the technology’s most prominent issues. Stories of AI repeating and even exaggerating
Read moreThe motto for this year’s cybersecurity awareness Month was “Do Your Part. #BeCyberSmart.” A good advice, since social engineering is still the No.1 attack vector in cybersecurity. We asked two experts to explain how much of a problem social engineering really is, how criminals exploit this and how to prevent against social engineering attacks.
Read moreData is germane to everything we’re experiencing because data has the power to impact outcomes. Read why now is the time to think about data security.
Read moreCriminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it
Read more