Insider Threats: Best Practices to Counter Them

Author(s):

Anas Baig, Product Manager, Securiti.ai

Insider Threats

Cybersecurity has become a critical strategic aspect for most organizations around the globe. Perhaps rightly so, considering the total damage caused by cyber-attacks in 2022 has already amounted to $6 trillion, this figure is likely to be much higher by the end of the year. According to the report by Cyber Security Ventures, this figure … Read more

Why We Need Security Automation

Author(s):

Ross Moore, Cyber Security Support Analyst, Passageways

security automation

It’s About Time 42:54. Minutes and seconds. That’s how fast the average ransomware variant encrypts 100,000 files and locks out a user. 04:09. That’s the few minutes and seconds Lockbit could take to encrypt 53 GB of data. Take a look at the cyber threat maps at FireEye, Checkpoint, and Digital Attack Map for views … Read more

Addressing Cybersecurity Issues in Telehealth

Author(s):

Frankie Wallace, ,

Cybersecurity issues in Telehealth

The healthcare industry has been notoriously lackluster when it comes to cybersecurity for a long time now. The long story short is that doctors are more focused on caring for their physical patients than they are on worrying about their data. That is on top of the fact that major health issues like COVID-19 are … Read more

How Data Privacy Laws Impact Companies’ Approach to Cloud Security

Author(s):

Anas Baig, Product Manager, Securiti.ai

Data Privacy Laws

It’s no secret that the beginnings of cloud computing were fairly humble. Executives within organizations were highly apprehensive about the idea of letting their most valuable asset, i.e., users’ data, be maintained on far-off sites in the care of strangers. However, to its credit, leaps in cloud security protocols and mechanisms meant that most companies … Read more

4 Food and Beverage Cybersecurity Challenges: How to Overcome Them

Author(s):

Brian Deken, NA Commercial Manager, Rockwell Automation

Food and Beverage Cybersecurity Challenges

The June 2021 ransomware attack on JBS Foods that knocked out the plant operations supplying roughly a fifth of the United States’ meat supply and created shortages across the country proved not only that no industry is immune to cyber-attack, but also that consumer packaged goods, food and beverage manufacturing is a critical industry. In … Read more

Benefits of Using Cloud Security Posture Management (CSPM)

Author(s):

Erik Kaminski, Author,

Cloud Security Posture Management

Cloud computing has been revolutionizing the IT industry in the last couple of years. As a relatively new technology, cloud computing has changed the way both companies and individuals go about handling the required resources. Namely, the cloud is often cheaper, faster, and more reliable than an on-premise environment, which is why cloud technology is … Read more

The Rising Threat of Mobile Phishing Attacks: Why Your Organization Needs to Prepare

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Mobile Phishing Attacks

The growth of mobile devices in the workplace has turned mobile phishing into a significant opportunity for malicious actors, and it’s therefore a growing concern for organizations. With mobile phishing, the attacker sends links to phishing websites via SMS messages, where they ask for your credentials. One study estimates that 75% of phishing websites specifically … Read more

Cyber Whistleblowing: What Employers Should Know

Author(s):

Frankie Wallace, ,

Cyber Whistleblowing

As businesses adopt emerging technologies like AI and VR, professional lives are growing more connected to the internet and, therefore, the world. While this can drastically improve efficiency and contribute to business growth, it has also led to a rise in cyber-attacks — and not just for tech companies. Cybercrime is affecting industries beyond tech, … Read more