phishing - search results
If you're not happy with the results, please do another search
Japan Aerospace Agency hit by ransomware attacks
Japan Aerospace Exploration Agency, commonly referred to as JAXA, recently fell victim to a cyber attack believed to be a ransomware variant. While an...
What is Advanced Threat Protection in Office 365 and How Does it Work?
Cyber threats are becoming more common by the day. However, we live in an era where digital threats are becoming increasingly sophisticated. When that's...
Why we need to make passwords a thing of the past
Alex Laurie, SVP Global Sales Engineering at Ping Identity
Passwords have been with us for decades. The problem is that people have far too many...
The Evolution of AI in Cybersecurity
Nima Baiati, Executive Director & GM, Commercial Cybersecurity Solutions, Lenovo
Perhaps not since the invention of the printing press has any technology been poised to...
Just beware of these 5 Black Friday or thanksgiving Cyber Scams
In a recent survey conducted by Lookout, it has been found that more than 3 out of 5 individuals are expected to take advantage...
Five Cybersecurity Predictions for 2024
"Over the past year, we’ve witnessed significant developments in cybersecurity, including the emergence of generative AI and its ability to enhance organizations’ threat intelligence...
Cyber Security news headlines trending on Google
Morgan Stanley Agrees to $6.5 Million Settlement with Six States Over Data Breach
Global financial services giant Morgan Stanley has reached a settlement of $6.5...
AI In Cybersecurity: Exploring the Opportunities and Dangers
By Dr. Madhu Shashanka, Chief Data Scientist and Co-Founder, Concentric AI
If you’ve been keeping with the news surrounding generative artificial intelligence (AI), you’re probably...
A Guide to Handling SAP Security Breaches
By Christoph Nagy, SecurityBridge
So your SAP system has been breached.
While this is not an unusual occurrence, it’s still a serious issue that needs your...
Employment Scams On The Rise: What Can HR Do To Mitigate Them?
Ani Banerjee, Chief Human Resources Officer, KnowBe4
Bad news. Your organization just announced a major restructuring, making your role “redundant”. You update your LinkedIn profile, using...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...