Passwordless: The New Mantra
Introduction The September 2023 hacking of MGM Resorts International by Scattered Spider, a relatively nascent hacking group operating out of the United States and UK, brought into sharp focus the risks of identity theft and credential harvesting from social engineering tactics deployed by threat actors. Using stolen credentials and brute phishing attacks, the group gained […]
Email Scams Reimagined: The Rise of AI-Driven Cyber Deceptions
There is almost nobody who has been on the internet, who has not encountered it. From the early 1980s, the Nigerian Prince email scam (10), requesting the user to remit a small sum of money – and thereby get him to reveal his personal information including banking details – in return for a huge windfall […]
Cybersecurity Talent Crisis Amid Shortages, Burnout, and CISO Resignations
Perhaps no other industry can lay claim to such a spate of challenges in a short span as the cybersecurity industry. Still very much in its infancy by most standards – it would not be out of place to put the age of the industry at just a few decades – cybersecurity has seen rapid […]
Navigating the Quantum Revolution: A New Era of Cybersecurity
Imagine a scene from the critically acclaimed film “The Imitation Game” – a race against time, set against the backdrop of World War II. Alan Turing, portrayed brilliantly by Benedict Cumberbatch, is frantically working with his team to decode the seemingly unbreakable Enigma machine used by the Nazis. This moment in history was not just […]
The Cybersecurity Renaissance: AI and Machine Learning in Threat Detection and Response
Introduction: In the annals of history, the Renaissance period stands out as a time of profound transformation and enlightenment, a period when humanity made giant strides in art, science, and understanding of the world. Today, in the realm of cybersecurity, we are witnessing a similar transformative era – thanks to the advent of Artificial Intelligence […]
Mastering Compliance in Cloud Computing: Strategies for the Modern Business
In today’s digital era, where cloud computing has become the backbone of many businesses, navigating the labyrinth of compliance and data protection regulations has emerged as a formidable challenge. The rapid adoption of cloud services, while offering numerous benefits, also brings into sharp focus the need for robust compliance strategies. This is particularly critical in […]
New Cybersecurity Legislations: Guiding Organizational Action and Beyond
It is a war out there alright, and strong words are in order. Released in August 2023, the Cybersecurity and Infrastructure Security Agency’s (CISA) 2024-2026 cybersecurity roadmap focusing on public-private collaborations and directing organizations to step up their cybersecurity postures in the light of burgeoning threats from scammers, couldn’t have said it better: Cyber incidents […]
Managed Service Providers – And Just Why Organizations Need Them On Board
Introduction In the rapidly evolving business world, Managed Service Providers (MSPs), until recently, have been the last word when it came to providing comprehensive, single-point Information Technology services. However, it’s become clear that times have been changing for a while now. The arrival of cloud computing championed by tech giants Amazon, Google, Azure, and others […]
The Importance of Threat Modeling for Organizations
Introduction It’s a war out there and the top brass have assembled. Enemy forces are posing a crisis and the generals must strategize their next move based on their intel covering the opposition’s numbers, strengths and weaknesses, and known lines of attack. Most of us will identify with this all-too-familiar scene in war films. Inevitably, […]
Redefining Cybersecurity Insurance for the Evolving Digital Threat Landscape
The 2017 Russian-backed NotPetya attack (1) that affected numerous verticals in over 65 countries worldwide, crippling computers with a worm that prevented systems booting, is a benchmark case showing why cyber insurance is behind the times and needs to evolve. Attributed to the infamous Sandworm group, the attack crippled nearly 80% of cyber installations in […]