Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 cybersecurity practices for back-to-school classrooms

For the education sector, data security ranges from the need to protect devices to safeguarding the sensitive information and privacy of its users, including students, their parents, and the institution's staff. Taking into account the current context in which educational centers operate, which involves combining remote learning and in-person teaching, as well as the use of personal devices, we analyze the most common cybersecurity threats affecting the sector.

The 443 Podcast Episode 210 - An Uber Hack

This week on the podcast, we cover Uber's most recent security incident and the alleged individual behind it. After that, we dive into the world of gas station operational technology and potential security weaknesses in one tool. Finally, we end with a chat about the FBI CISO Academy and how the FBI as a whole is trying to reshape relationships with the private sector. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Webinar: Keeping Up with the Threat Landscape - 22 September 2022

In order to stay one step ahead of cyber adversaries, you need to understand how they work. The modern threat landscape is constantly evolving as sophisticated threats emerge and quickly become commoditized. In this webinar, Marc Laliberte, director of security operations at WatchGuard, will give you a view of the latest threat landscape, including the attack tools and techniques you need to defend against.

Insiders cause 20% of data breaches

Apart from external attackers, organizations need to consider another type of threat when planning their cybersecurity strategy: insider threats. There are different types of insiders. On the one hand, there are people who have secret knowledge and unintentionally create risk openings within an organization; and on the other, there are others who intend to cause harm, motivated by profit, extortion, or personal grievance. This means insiders can be classified as follows.

Endpoint protection offers an anti-ransomware measure for legal firms

For legal professionals, digital transformation also delivers significant benefits. Integrating technologies such as e-signatures, automating contract creation, Cloud-based collaboration tools, AI-powered documents, clause and contract review tools, and Cloud-based services are boosting the competitiveness of law firms in the post-pandemic world. However, these technological advantages for legal professionals can be threatened through exposure to cybercrime.