Mass Breaches in the Age of AI

Mass Breaches in the Age of AI

Targeted Scams & What to do About Them Chris Clements, VP of Solutions Architecture Companies that have suffered massive data breaches are quick to downplay the risks, but they’re ignoring the elephant in the room: the sheer volume of personal information that’s been exposed. Nothing to See Here, Folks! The ... Read More
Cyber Safe for the Holidays

Cyber Safe for the Holidays

The holiday season brings joy, festivities, and amazing deals – but it also attracts cybercriminals looking to take advantage of eager shoppers. Here’s how to protect yourself while hunting for the perfect gifts. After a day of feasting with family and friends, the holiday shopping season officially begins next Friday, ... Read More
The Benefits of Upgrading to XDR: Why MDR is No Longer Sufficient as 2024 Comes to a Close

The Benefits of Upgrading to XDR: Why MDR is No Longer Sufficient as 2024 Comes to a Close

Gary Perkins, Chief Information Security Officer, CISO Global Upgrading to XDR is not just a technological upgrade—it’s a strategic move toward future-proofing your cybersecurity posture against the ever-evolving landscape of cyber threats. Cybersecurity has never been as critical as it is today. With cyberattacks becoming more frequent, sophisticated, and pervasive, ... Read More
The Global Effort to Maintain Supply Chain Security | Part Two

The Global Effort to Maintain Supply Chain Security | Part Two

Various Cybersecurity Experts, CISO Global A well-run kitchen requires a fully stocked pantry and a clear understanding of what’s on hand. In cybersecurity, your pantry is your asset inventory—every server, every piece of software, and even those firmware components lurking in the background. You wouldn’t want to cook without knowing ... Read More
AI in Banking: No Longer Just for the Big Banks

AI in Banking: No Longer Just for the Big Banks

Tigran Safari, Client Success Manager AI isn’t some far-off sci-fi concept anymore. It’s here, and it’s coming to a bank near you! Listen to the latest from Tigran Safari and Chris Clements on this month’s Banking Podcast from The Kafafian Group We’ve spent a significant part of our journey working ... Read More
Cyber Scams & Why We Fall for Them

Cyber Scams & Why We Fall for Them

Gary Perkins, Chief Information Security Officer Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical thinking is often overridden. Attackers don’t just hack systems; they hack people, and they’re exceptionally good at it ... Read More
Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!

Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!

Chris Clements, VP of Solutions Architecture Because of the frequency of phishing attacks landing in user mailboxes and the severity of the consequences of a user falling for a lure, any improvement at all can make the difference between an organization suffering a breach.  Detrimental Best Practices One of my ... Read More
Identity Under Siege: Responding to the National Public Data Breach

Identity Under Siege: Responding to the National Public Data Breach

Gary Perkins, Chief Information Security Officer, CISO Global While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, focus on taking concrete steps to protect yourself. Stay informed, be proactive in safeguarding your personal information, and ... Read More
A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security

A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security

Various Security Experts at CISO Global  …In the world of supply chain security, vigilance is your best friend. Stay informed, stay alert, and always prioritize security in your decisions. After all, in this interconnected digital world, we’re all in this together. Imagine you’re hosting a dinner party, and you’ve carefully ... Read More
Navigating the Shared Responsibility Model: Lessons Learned from the Snowflake Cybersecurity Incident

Navigating the Shared Responsibility Model: Lessons Learned from the Snowflake Cybersecurity Incident

Jerry Dawkins, PhD In the world of cybersecurity, the recent incident involving Snowflake has sparked a significant discussion around the shared responsibility between vendors and customers. The attacks, which targeted over 100 Snowflake customers, have highlighted vulnerabilities that arise not from the platform itself, but from how customers manage their ... Read More