Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Underground Alliances: State-Sponsored Hacking & Ransomware Realities Unveiled | Razorthorn Security

Uncover the covert world of state-sponsored hacking in our latest video. Explore how decent hacking groups showcase their skills, often in the realm of ransomware, to secure sponsorships through discreet back channels. These partnerships, sometimes with organizations linked to government-affiliated entities, provide the green light to target perceived adversaries. Has the spotlight dimmed on these activities? Quite the contrary – it's expanding.

Risk Management Essentials: How to Build A Risk Register

This session will equip you with the knowledge and skills to confidently handle unpredictable risks in your organization. Our expert facilitators will guide you through the evolving landscape of risk management and demonstrate how to integrate risk management seamlessly into your organization. We’ll reveal the secrets to impressing auditors and gaining executive support for your risk management initiatives.

Data Privacy Dilemma: How to Address Growing Concerns in an Extremely Online World

Users are becoming increasingly aware of where and how their information is shared, and their concerns regarding the need to keep that data private are growing in turn. Digitalization, rising daily averages for time spent on the Internet and connected devices, along with the ongoing proliferation of cyberattacks, have made individuals more cautious than ever when it comes to providing information online – and rightfully so.

How to Strengthen Cybersecurity in the Healthcare Industry

Technology is a crucial part of today’s healthcare and pharmaceutical industries. Advances in medical devices, data use, and interconnected systems have significantly improved patient care, reduced costs, and increased efficiency. However, as the sector’s reliance on technology grows, so does the risk of cyberattacks.

Trustwave SpiderLabs Detects Spike in Greatness Phishing Kit Attacks on Microsoft 365 Users

Trustwave SpiderLabs is tracking a spike in usage of the Greatness phishing kit to attack Microsoft 365 users to distribute malicious HTML attachments that steal login credentials. Greatness is a phishing-as-a-service platform developed by a threat actor known as "fisherstell," and has been available since mid-2022 that provides a ready-made infrastructure and tools for anyone to launch phishing campaigns charging $120 per month in Bitcoin.

What Is the Best Google Drive Alternative in 2024?

Data privacy continues to be a hot topic as we become more connected via our devices and even in Virtual or Augmented realities. Technology advancements bring many questions, including how technology protects data (if at all) and how people can ensure their data remains secure. Fortunately, there is a wealth of resources on online privacy out there.