Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The Dark World of Cybercrime and the Illusion of Cyber Insurance | James Rees

James Rees, the cybersecurity expert from Razorthorn Security, delves into the intricate workings of cybercrime groups and the challenges they pose to organizations worldwide. James sheds light on the independent nature of these groups, comprising affiliates, access brokers, and analysts, who operate with alarming efficiency. He reveals how analysts assess a company's vulnerability and potential payout based on various factors, including cyber insurance coverage. Prepare to be shocked as James delivers a harsh reality check on the efficacy of cyber insurance in today's ever-evolving threat landscape.

What Is Data Masking and What Are Its Benefits

Protection methods for sensitive data have evolved to encompass new forms of thinking to combat constant threat vectors and attacks. Protecting against malware, brute force attacks, and malicious code, data engineers at Cisco, Microsoft, and others craft unique methods to counter the never-ending aggression. Data Masking and data encryption are two similar technologies with different characteristics, purpose, and technique.

Beyond the firewall: How social engineers use psychology to compromise organizational cybersecurity

A Social engineering attack is the process of exploiting weaknesses in human psychology to manipulate and persuade others to perform in a way that is harmful. Prior to the digital age, criminals would carry out these attacks in person, in what was known as a confidence game. The perpetrators were referred to a “con men”, regardless of their gender.

An Active Directory Domain Controller Could Not Be Contacted

When I try to join a new Windows workstation or server to an Active Directory (AD) domain, I sometimes encounter the following error: “An Active Directory Domain Controller (AD DC) for the domain ‘domainname’ could not be contacted.” This error can occur due to any of several reasons, from a simple incorrect DNS server IP address to a much more complex issue.

What does Vietnam's mandatory ID law mean for social media? | Insights on privacy, censorship & user impact

Vietnam’s government is taking steps to combat online scams and other forms of cybercrime by making it mandatory for users of Facebook, TikTok, and other social media networks to verify their identities using real-time identity verification. According to the Global Anti Scam Alliance, Vietnam has one of the highest rates of online fraud in Asia.

How Can Ekran System Protect You against Infected USB Devices?

While it’s difficult to imagine our business lives without USB devices, each USB connection can pose a serious risk to an organization’s security. Attackers can infect USB devices with malware that attacks your corporate system once a user connects an infected device. Such attacks can damage your infrastructure or machines and result in the theft or compromise of sensitive data.

The Impact of Government Legislation on Cybersecurity | James Rees, Razorthorn Security

Join us as we sit down with James Rees, cybersecurity expert from Razorthorn Security, to discuss the ever-changing landscape of government legislation and its impact on cybersecurity. James shares his insights on the challenges faced by cyber security professionals due to prolonged discussions and delayed releases of legislation. With examples from Europe and the UK, he highlights the need for timely action in the face of rapidly evolving cyber threats. Don't miss this eye-opening conversation that sheds light on the struggles faced by security teams and the urgency to stay ahead of the game in a constantly evolving digital world.