Did you know that 79% of top CIOs believe AI-driven cyberattacks will be the most challenging threat in the next five years? As organizations prepare...
Top tips: Camfecting—Protect yourself from prying eyes
Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week,...
Tech tales and endpoint hacks: Dive deep with Endpoint Pulse
Remember the captivating stories you heard growing up? Though we may have graduated to books and then podcasts, the power of storytelling remains. There’s something...
Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1
In the realm of payment security, the Payment Card Industry Data Security Standard (PCI DSS) provides a critical framework that guides businesses to protect cardholder information...
Understanding the Okta supply chain attack of 2023: A comprehensive analysis
In October 2023, Okta, a leading provider of identity and access management (IAM) solutions, experienced a data breach affecting its customer support system. This incident...
Adopting the 5S strategy in cybersecurity
The 5S strategy has long been considered a reliable approach to workplace organization. Originated and developed as a strategy to facilitate just-in-time manufacturing in post-war...
MOVEit mayhem: Attackers found, patch released, but no end in sight
The entire cybersecurity realm is buzzing over zero-day vulnerabilities and SQL injection attacks owing to the MOVEit Transfer MFT breach. In case you missed it, here’s...
Unravelling the TDIR framework: Conception, evolution, and categorization
Cybersecurity is a mix of both reactive and proactive approaches. In the past, enterprises were often limited to the reactive approach. With compliance and security...