10 Strategies to Stop Ransomware Attacks

A ransomware attack can hold your organization’s data hostage. Attackers demand payment to release the information. Here are some ways to stop ransomware attacks. 1. Teach User Awareness A key line of ...

IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

Information by itself is generally boring. My role as a writer is to take relevant facts and details and put them into a format that my audience wants to read. The very ...

Malicious hackers are finding it too easy to achieve their initial access

It should be hard for malicious hackers to break into systems, but all too often it isn’t. That’s a takeaway from a joint cybersecurity advisory issued by the Cybersecurity and Infrastructure Security ...

Cybersecurity Myths that are Compromising Your Data and How to Address Them

As the importance of cybersecurity has increased, so has our awareness of it. Poor cybersecurity has been identified as the most pressing threat to businesses today. Issues with cybersecurity often stem from ...
Rehumanizing Cybersecurity with Lianne Potter

Rehumanizing Cybersecurity with Lianne Potter

Award-winning security transformation manager and digital anthropologist Lianne Potter joins us to discuss the fascinating topic of digital anthropology and how we can rehumanize cybersecurity. In this episode Lianne discusses how she ...

Growing Attacks Underscore the Importance of API Security

Similar to how a mobile app is an application which runs on a smartphone, a web app refers to a software application that carries out a particular function using a web browser ...
What Does a Cyber Threat Intel Analyst Do? A Look at the Intelligence Professionals Who Bring Threat Intel Programs to Life

What Does a Cyber Threat Intel Analyst Do? A Look at the Intelligence Professionals Who Bring Threat Intel Programs to Life

What is a threat intelligence analyst? A strong cyber threat intelligence program is your organization’s most valuable line of defense against attacks that harm your customer, users, data, assets, infrastructure, and personnel ...
Social Engineering News: Global Cybersecurity Concerns

Social Engineering News: Heightened Cybersecurity Concerns

Current events in Ukraine have created heightened cybersecurity concerns. For this reason, CISA (Cybersecurity and Infrastructure Security Agency) issued a rare “Shields Up” alert for all organizations to be prepared ...
™

Fixing the Shortage of Information Security Professionals

Using the Easy Button™ Last month, we posted our blog explaining the staffing shortage in the information security (InfoSec) industry. It can often take three to six months to fill ...

How to Stimulate Organizations’ Security Awareness Training Programs

We all know how important security awareness training is for an organization. Moreover, we try to enhance our efforts by weaving security into the “culture” of the organization. Yet, from the employee’s perspective, ...

API Poll

Step 1 of 5

Do you have an API security project in 2022?