
Ransomware gangs target organizations during holidays and weekends
Ransomware gangs may take advantage of upcoming holidays and weekends to hit US organizations, the FBI and the CISA have warned. They don’t have any specific threat …

How do I select a hardware security module for my business?
Protecting your data has never been more important, and the best way to do it is by using encryption keys. These keys should then be stored inside a hardware security module …

How do I select an automated red teaming solution for my business?
Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, …

The 3 Rs of visibility for any cloud journey
Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …

Where do we stand when it comes to multi-cloud maturity?
Most IT leaders agree their future-state IT landscape will be a multi-cloud environment. Figuring out how to achieve that will take some time. In this interview with Help Net …

NAS devices under attack: How to keep them safe?
Network-attached storage (NAS) devices are a helpful solution for storing, managing, and sharing files and backups and, as such, they are an attractive target for cyber …

How do I select a CPaaS solution for my business?
A Communications Platform-as-a-Service (CPaaS) solution is very practical and functional because it allows to communicate without using standalone apps, but since it’s …

Stop the breaches! Four steps to minimize security risks
Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. …

How to prepare for Apple’s Mail Privacy Protection
Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half …

Ransomware and cyber insurance: What are the risks?
High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple …

A remedial approach to destructive IoT hacks
As of this year, there are more than 10 billion active IoT devices all over the world, many of which are deployed in enterprises. Keeping those devices secure is of the utmost …

Elevating cyber resilience and tackling government information security challenges
Esti Peshin is VP, General Manager, Cyber Division, Israel Aerospace Industries (IAI). Previously, she served 11 years in the Israeli Defense Forces, in an elite technology …
Featured news
Resources
Don't miss
- Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
- LLMs at the edge: Rethinking how IoT devices talk and act
- How to build a secure AI culture without shutting people down
- ScreenConnect admins targeted with spoofed login alerts
- Fake macOS help sites push Shamos infostealer via ClickFix technique