Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

U.K. Advance Fee Scams Increase by Over 600% in Less Than Two Years

New data from the U.K.’s Office of National Statistics shows that this often overlooked scam has grown significantly in interest – likely because it pays off. If you’re not familiar with this kind of scam, it’s pretty simple: the scammer presents the victim with an opportunity for a grant, a prize – something of value – but requires a small payment up front (often called a processing fee, etc.).

Cyber Insurance Demand Grows as Cybercrime is Expected to Rise to $24 Trillion by 2027

As cyber attacks continue to grow in sophistication, frequency, cyber insurers are expecting their market to double in the next two years. I’ve spent a lot of time here on this blog educating you on attack specifics, industry trends, and the impacts felt by attacks. I’ve also talked quite a bit about cyber insurance and the trends therein. But seldom have we been able to combine the two and present the state of cyber attacks from an insurer’s perspective.

EP 27 - How Identity Factors into DevSecOps

In today’s Trust Issues episode, Dusty Anderson, a managing director of Global Digital Identity at the consulting firm Protiviti, digs into all things DevSecOps and cautions against a one-size-fits-all approach. In conversation with host David Puner, Anderson emphasizes the significance of strategic planning and well-defined goals – demonstrating how bite-sized steps can add up to major security wins and bottom-line benefits over time.

Instaproof in action! Drag. Drop. Verify!

Will demonstrates how easy it is to use RKVST Instaproof to verify the authenticity of a document. With Instaproof, you can drag and drop any file to instantly verify its origin, so you can make informed decisions about whether to trust it or not. Instaproof is perfect for anyone that wants to ensure the authenticity and provenance of their data, whether it's for regulatory compliance, intellectual property protection, or just good business practice.

RKVST Instaproof - instant data provenance

Drag. Drop. Verify! Instantly verify the origin, provenance and authenticity of any file with a simple drag and drop. Quickly identify fraudulent or modified data, or data of unknown provenance. RKVST Instaproof is the fastest way to instantly prove who did what when for any digital asset. Connects with your existing data – on premises or in the cloud including Dropbox, OneDrive and Google Drive.

Cyberattack Maps Explained: The Value & Limitations of Cyber Attack Maps

While most people understand that cybercrime is rising, it’s challenging to fathom just how widespread it is. In 2007, researchers found there was a cyberattack every 39 seconds. By 2022, those numbers seemed small and innocent in comparison: The sheer scale of attacks makes it a challenge to understand and find emerging threats or identify trends. Cyberattack maps provide visuals that clarify numbers that can be otherwise difficult to understand and bring to light the dark activities online.