Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CNSS Instruction: Why It's Critical for National Security and Your Organization

As cyber threats evolve, so must the strategies and frameworks that protect the data and systems that are at the heart of national defense, intelligence, and security. At a time when cyber threats are becoming more sophisticated, the need to protect national security systems (NSS) has never been more critical. With this in mind, the Committee on National Security Systems (CNSS) was formed to oversee cybersecurity standards for some of the most vital and sensitive U.S. government infrastructures.

APT Rogues' Gallery: The World's Most Dangerous Cyber Adversaries

Advanced Persistent Threat (APT) groups are not a new scourge. These sophisticated, state-sponsored cyber adversaries, with deep pockets and highly advanced technical skills, conduct prolonged and targeted attacks to infiltrate networks, exfiltrate sensitive data, and disrupt critical infrastructure.

Best Practices for Transitioning from Security to Privacy

As global privacy requirements evolve, many information security professionals are called upon to enhance or lead information privacy programs. While this transition may seem like a natural progression, I learned five important lessons when I moved from a focus on security and audit to the field of information privacy.

Article 7 of GDPR: Preserving Data Integrity in Image Publication

For all the tremendous opportunities that the digitization of business operations has unlocked, there are also complex security and data privacy challenges that organizations have to navigate. In the interests of business privacy and security, legislation exists to hold organizations and policymakers to account. None are perhaps more influential and necessary than the EU’s General Data Protection Regulation (GDPR).

Energy Under Siege: How the Industry is Fighting Against Cyber Attacks

The energy sector has become a prime target for cyberattacks, with successful breaches posing severe risks to national security, economic stability, and public safety. Luckily, the industry is standing up and taking notice, with two-thirds of energy professionals (65%) now saying their leadership now sees cybersecurity as the greatest risk to their business.

Ransomware Reaches A Record High, But Payouts Are Dwindling

Shed a tear, if you can, for the poor, misunderstood cybercriminals hard at work trying to earn a dishonest crust by infecting organisations with ransomware. Newly released research has revealed that the riches to be made from encrypting a company's data and demanding a ransom are not proving so easy to come by as they once were. Because, although the number of ransomware attacks are reported to have reached record-breaking heights in the first months of 2025, gangs' profits are thought to be plummeting.

The Cost of Ransomware: Shutdowns & Extortion

Ransomware is no longer in its heyday. Evolving, AI-driven cybersecurity tools and global law enforcement efforts have seen to that. But that doesn’t mean ransomware is no longer a threat. In fact, in some ways, the danger is greater than ever. While ransomware attacks are less common than they used to be, the consequences of those that succeed are more severe. Earlier this year, the Ponemon Institute published a study revealing massive changes in the ransomware landscape.

How CEOs Can Embrace GenAI for Business Growth

It’s well-trodden ground by now, but generative AI is really one of the business world’s most important technologies. Like it or not, it will soon become integral to everyday business operations. Those who learn how to use it effectively will flourish, and those who don’t will fall by the wayside. As highlighted by IBM’s The CEO’s Guide to Generative AI highlights, CEOs face serious pressure to integrate the technology into their organization.

Mastering Cybersecurity Incident Communication Part 1: A Proactive Approach

Cybersecurity threats are no longer a matter of "if" but "when." While companies invest heavily in technical defenses, one important aspect often gets overlooked — communication. How an organization communicates during a cybersecurity incident determines the speed and effectiveness of its response, as well as the level of trust it maintains with stakeholders.