GUEST ESSAY: How the ‘Scattered Spiders’ youthful ring defeated MFA to plunder Vegas

GUEST ESSAY: How the ‘Scattered Spiders’ youthful ring defeated MFA to plunder Vegas

A hacking gang known as Scattered Spiders soundly defeated the cybersecurity defenses of MGM and Caesars casinos. Related: Russia puts the squeeze on US supply chain This cost the Las Vegas gambling ...
GUEST ESSAY: The many channels law enforcement pursues to mitigate cyber threats

GUEST ESSAY: The many channels law enforcement pursues to mitigate cyber threats

Throughout 2023, we’ve witnessed numerous significant cyber incidents. One of the largest this year was the MOVEit breach, which impacted various state motor vehicle organizations and exposed driver’s license information for nearly ...
GUEST ESSAY: How to mitigate the latest, greatest phishing variant — spoofed QR codes

GUEST ESSAY: How to mitigate the latest, greatest phishing variant — spoofed QR codes

QR code phishing attacks started landing in inboxes around the world about six months ago. Related: ‘BEC’ bilking on the rise These attacks prompt the target to scan a QR code and ...
GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

Cisco’s $28 billion acquisition of Splunk comes at an inflection point of security teams beginning to adopt to working with modern, cloud-native data lakes. Related: Dasera launches new Snowflake platform For years, ...
GUEST ESSAY:  A primer on best practices for automating supply chain cybersecurity

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

Supply chain security grows more crucial daily as cybercriminals attempt to disrupt distribution and transportation. In response, industry professionals must automate their cybersecurity tools to stay ahead. Why so? The 2020 SolarWinds ...
GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

Surrounded by the invisible hum of electromagnetic energy, we’ve harnessed its power to fuel our technological marvels for decades. Related: MSFT CEO calls for regulating facial recognition tech Tesla’s visionary insights from ...
GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity

GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity

If you’re a small business looking for the secret sauce to cybersecurity, the secret is out: start with a cybersecurity policy and make the commitment to security a business-wide priority. Related: SMBs ...
GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals

GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals

Ransomware is a significant threat to businesses worldwide. There are many gangs that work together to orchestrate increasingly damaging attacks. However, some of these groups follow codes of conduct that prevent them ...
GUEST ESSAY: The timing is ripe to instill trust in the open Internet — and why this must get done

GUEST ESSAY: The timing is ripe to instill trust in the open Internet — and why this must get done

In today’s digital age, trust has become a cornerstone of building a better Internet. Preserving privacy for a greater good The Internet was designed as a platform for peer research, not for ...
GUEST ESSAY: Robust data management can prevent theft, guard intellectual property

GUEST ESSAY: Robust data management can prevent theft, guard intellectual property

In an era of global economic uncertainty, fraud levels tend to surge, bringing to light the critical issue of intellectual property (IP) theft. Related: Neutralizing insider threats This pervasive problem extends beyond ...