There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries.
Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.
This video is the latest installment of a multi-part
Ransomware risks are skyrocketing with increasing costs, more attacks, and greater impacts that are expanding to affect everyone!
It is a growing threat to organizations and national critical infrastructures connected to the Internet. Ransomware puts
Without trust, the adoption slows and therefore spending diminishes over time, which reduces available resources for innovation. Everything becomes inhibited and our digital world stagnates or grinds to a halt.
Cybersecurity (security, privacy, and sa
We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizat
New CPU Vulnerabilities Discovered
RIDL/ZombieLoad and L1DES/CacheOut are just the latest variants of vulnerabilities discovered in Intel CPU’s that target Micro-architectural Data Sampling (MDS) weaknesses. Discovered over 7 months ago, researchers r
Avast was recently caught selling user's web browsing data. Sensitive data like website destinations, search terms, and even what videos customers watched were collected by Avast software residing on customers' computers. The data was repackaged an
Artificial intelligence – more specifically, the machine learning (ML) subset of AI - has a number of privacy problems.
Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access to even
Topic of discussion : The Talent Shortage in Cybersecurity
Listen To Podcast: https://player.captivate.fm/episode/6c842a64-cff1-4119-beb3-1989940c47cf
Thank you Katelyn Ilkani, I thoroughly enjoyed discussing the challenges of the talent shortage in cy
For over 30 years I have continually sought-out new professional challenges, been enticed at opportunities to overcome near-impossible obstacles, and have taken on new roles to further the cybersecurity industry.
It is time for the next big move and
The video conference company Zoom has skyrocketed to new heights and plummeted to new lows in the past few weeks. It is one of the handful of communications applications that is perfectly suited to a world beset by quarantine actions, yet has fallen
The Coronavirus pandemic is changing how people receive healthcare with a shift to more remote diagnosis options being rolled out as a first line of care. The advantages are many, but as an unfortunate result, healthcare data breaches will begin to
Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management’s commitment for secure products, the respect for user privacy, the honesty of its marketing, and the design decisions that preserve a positive user exper
Note: this page contains paid content.
Please, subscribe to get an access.