threat intelligence

ISACA launches AI security management certification

Security professional association ISACA is to offer its member base of almost 200,000 accredited security professionals around the world access to a new certification, Advanced in AI Security Management (AAISM), covering the fast-emerging technology. A recent ISACA study revealed that 61% of security professionals were either very or extremely worried that generative artificial intelligence (GenAI)…

ISACA launches AI security management certification Read More »

Black Hat USA: Halcyon and Sophos tag-team ransomware fightback

Cyber protection specialists Halcyon and Sophos have teamed up to develop a threat intelligence sharing joint venture that will see the two companies swap data on critical metrics such as indicators of compromise (IoCs), known adversary behaviours and attack patterns. Announced at the annual Black Hat USA event in Las Vegas, the partnership will see…

Black Hat USA: Halcyon and Sophos tag-team ransomware fightback Read More »

Cyber criminals would prefer businesses don’t use Okta

Cyber criminal gangs are telling their targets to stop authenticating with Okta services in what the company’s threat management team is describing as a ringing endorsement of its technology and a lesson in why phishing-resistant authentication methods are now not merely a nice-to-have, but a must-have. Due to its position as a first line of…

Cyber criminals would prefer businesses don’t use Okta Read More »

M&S calls for mandatory ransomware reporting

Marks & Spencer chairman Archie Norman has described the recent ransomware attack on the retailer’s systems as something akin to an “out-of-body experience” as he called for cyber attack victims to be brave, bite the bullet, and be open and transparent about their experiences. Speaking before the Business and Trade Sub-Committee on Economic Security, Arms…

M&S calls for mandatory ransomware reporting Read More »

Scattered Spider widens web to target insurance sector

Insurance companies are warned to be on their guard against a spreading campaign of network intrusions orchestrated by the Scattered Spider cyber crime collective after evidence emerged that the teenage hacking gang has hit multiple insurance companies in the US amid a months-long resurgence in its activity, according to the Google Threat Intelligence Group (GTIG).…

Scattered Spider widens web to target insurance sector Read More »

June Patch Tuesday brings a lighter load for defenders

Microsoft’s latest Patch Tuesday update landed on schedule on 10 June, with admins facing a much lighter load heading into the summer – at least lighter than of late – with barely 70 security flaws awaiting attention and just two potential zero-day common vulnerabilities and exposures (CVEs) in scope. The two most pressing issues for…

June Patch Tuesday brings a lighter load for defenders Read More »

Cyber security beyond compliance: Why resilience is the new boardroom imperative

Cyber security has long been the concern of CIOs, CISOs, and compliance officers. It was a regulatory obligation for many boardrooms – tick the box, demonstrate due diligence, and move on. That approach is no longer tenable. In today’s threat landscape, cyber is not simply a technical risk – it’s a strategic, enterprise-wide concern with…

Cyber security beyond compliance: Why resilience is the new boardroom imperative Read More »

Microsoft outlines three-pronged European cyber strategy

Microsoft has today launched a European Security Programme (ESP) for government bodies in the region, throwing a protective embrace around all 27 European Union (EU) member states, EU accession candidates, European Free Trade Association members, the UK, Monaco and the Vatican. Recognising that the European cyber threat landscape is in a state of flux as…

Microsoft outlines three-pronged European cyber strategy Read More »

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration for IT security teams and professionals. As such, AWS offers a broad range of cyber security tools to secure AWS-based tech stacks. They cover areas such as data privacy, access management, configuration management, threat detection,…

How cyber security professionals are leveraging AWS tools Read More »

Rethinking secure comms: Are encrypted platforms still enough?

In today’s constantly changing cyber landscape, answering the question “what does best practice now look like?” is far from simple. While emerging technologies and AI-driven security tools continue to make the headlines and become the topics of discussion, the real pivot point for modern security lies not just in the technological advancements but in context,…

Rethinking secure comms: Are encrypted platforms still enough? Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top