Promo
The Small Idea With a Big Impact on the Cybersecurity Talent Gap
The cost of cybercrime is expected to reach $8 trillion globally this year, yet the scarcity of security talent is becoming more pronounced. With more than 750,000 cybersecurity positions unfilled in the ...
How to plan Web Penetration Testing : A guide in 2023
Introduction Navigating the complex terrain of web penetration testing can be daunting. As an experienced penetration tester specialising in web application security, I can assure you that one of the most valuable ...
Cybersecurity Awareness Month: #SecureOurWorld | Contrast Security
Contrast is once again proud to be a Champion for Cybersecurity Awareness Month throughout October, to help in promoting global awareness of online safety and privacy. This annual campaign is a global ...
“That’s Out of Scope,” Said No Attacker Ever
Organizations need to go to the same lengths as attackers, but that’s a long way… When Ellopunk found this in her backpack (℅ Sarah Young) and posted it to Twitter[X] (thank you!), ...
How Zero Trust Mitigates Zero-Day Attacks
Zero-day attacks can be mitigated with zero trust (least privilege access) best practices Zero-day attacks, fueled by their stealthy nature and unknown vulnerabilities, pose a significant threat to organizations, worldwide and across ...
How Attorneys Are Harming Cybersecurity Incident Response
New paper: “Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys“: Abstract: Incident Response (IR) allows victim firms to detect, contain, and recover from security incidents. It should ...
Protecting Cybersecurity Infrastructure During Mergers and Acquisitions
Cybersecurity due diligence for business consolidation Mergers and acquisitions (M&A) and divestitures are complex processes that require careful planning and execution. Cybersecurity is a critical (yet often overlooked) aspect of these transactions ...
Getting Started: Basic Personal Cybersecurity for Everyone (3 Easy Tips)
This post was originally published on 10 MAY 2023; it has since been updated and revised. Welcome to the world of cybersecurity! This guide was written for complete cybersecurity and privacy novices ...
Ransomware Detection Using Hardware
Computer processors get the final word when running programs. Can they judge bad code from good? Is ransomware detection using hardware possible? We look at Intel’s approach to improving ransomware detection. All ...
Are Technical Support Scams Getting More Advanced?
Technical support scams (TSS) are responsible for a growing amount of financial losses year after year. Nevertheless, while the victims are losing more money than ever, the number of interactions between criminals ...