Tanium’s free risk assessment provides customers with a complete view of their risk posture

Tanium announced a new comprehensive, no-cost, five-day risk assessment that provides a holistic and quantifiable enterprise-wide view into an organization’s risk posture, a distilled score and comparison of risk... Read more »

CoreStack appoints Robert Ford as VP of Enterprise Strategy

CoreStack announced the appointment of Robert Ford as Vice President of Enterprise Strategy. CoreStack has been experiencing tremendous growth fueled by acceleration of cloud-based digital transformation and demand for... Read more »

IBM amnnounces multi-million dollar in-kind grants to help schools fight off cyberattacks

IBM announced it will provide in-kind grants valued at $5 million to help address cybersecurity resiliency in schools worldwide. For the second year in a row, six school districts... Read more »

Account pre-hijacking attacks possible on many online services

Online accounts getting hijacked and misused is an everyday occurrence, but did you know that account pre-hijacking attacks are also possible? Inspired by previous research on preemptive account hijacking... Read more »

RansomHouse: Bug bounty hunters gone rogue?

A new cybercrime outfit that calls itself RansomHouse is attempting to carve out a niche of the cyber extortion market for itself by hitting organizations, stealing their data, and... Read more »

Since organizations apply more compliance programs, proper planning is essential

A-LIGN released its 2022 Compliance Benchmark Report, highlighting the concern over increased threat of ransomware attacks and the need for organizations to adopt a more streamlined approach to their... Read more »

Paying ransom doesn’t guarantee data recovery

A Veeam report has found that 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability to recover data without paying the ransom.... Read more »

Taking the right approach to data extortion

Cybercriminals often specialize. An extortion effort usually begins with a person or a team selecting targets in one of two ways: either they get a request from an extortionist... Read more »

What does prioritizing cybersecurity at the leadership level entail?

Week after week, month after month, shareholder cyber lawsuits hit the news. Capital One settles for $190 million. A class-action lawsuit was filed against Ultimate Kronos Group for alleged... Read more »

Vishing cases reach all time high

Vishing (voice phishing) cases have increased almost 550 percent over the last twelve months (Q1 2022 to Q1 2021), according to the latest Quarterly Threat Trends & Intelligence Report... Read more »
Subscribe to our Newsletter