Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How To Maintain Security When Employees Work Remotely

As remote work increases, organizations are faced with new cybersecurity challenges. When employees access sensitive company data from various locations and devices, traditional security perimeters dissolve and create potential vulnerabilities. This guide focuses on proactive measures, strategies, best practices, and advanced monitoring solutions to employ when your employees work remotely.

EP 60 - Going Viral: Security Insights from TikTok's Former Global CSO

In this episode of the Trust Issues podcast, Roland Cloutier, who served as TikTok’s Global Chief Security Officer (CSO) from April 2020 to September 2022, joins host David Puner for a discussion that covers his extensive experience in the field of security. He previously held similar roles at ADP and EMC and is now a partner at the Business Protection Group.

How To Stop Spam Calls

Although there is no way to stop receiving all spam calls, there are steps you can take to reduce the number of spam calls you receive. According to Truecaller’s 2024 report, Americans collectively receive an average of 2.5 billion spam and unwanted calls every month. While spam calls do not always have malicious intent, like hacking your phone or stealing your money, they can grow annoying since they are unwanted and persistent.

Ace Your Back-to-School Season with Threat Intelligence

As the school year officially kicks off, students everywhere are hitting the books. But it’s also time for IT and security teams as well as administrators to get up to speed on the latest cyber threats that may impact their environment. The education sector is a treasure trove of valuable data – from financial and sensitive personal information to intellectual property and raw research data – which makes it an attractive target for threat actors.

How MiCA Can Bring Much Needed Regulatory Clarity to the $152 Billion Stablecoin Market

Regulations are often a welcome signal toward market maturation, acceptance, and assurance for new technologies and financial practices. The European Commission’s “Markets in Crypto Assets Regulation” (MiCA) is no exception. A significant piece of legislation, MiCA has been heralded by some as the end of the “crypto wild west”, bringing crypto-assets, crypto-asset issuers, and crypto-asset service providers under a regulatory framework for the first time.

The Vision Leading to Check Point's Acquisition of Cyberint

The cyber threat landscape is complex and includes many vectors of attack. Organizations face critical security challenges every day, such as stolen employee credentials, fake websites, and social media impersonation. Taking a binary point of view, those threats can be divided into two simplistic dimensions: external and internal. According to the 2023 Verizon DBIR, the external threats consume 83% of the total threats.

The Problem with Disjointed Cloud Migration Journeys

Organizations start their cloud migration journey with high hopes for more speed, agility, and innovation. But often, these hopes fall short. Instead of achieving a seamless, cloud-powered enterprise, companies end up with fragmented cloud projects, data security risks, and unpredictable spending. This scattered approach can stall cloud initiatives and prevent organizations from fully benefiting from the cloud. Let’s take a look at some of the impacts and risks.

Here's How Phishing Messages Break Through Email Filters

Phishing is an email-borne malicious technique aimed at learning the sensitive credentials of users or spreading malware. This practice has been on the list of the top cyber threats to individuals and businesses for years. According to the latest Phishing Activity Trends Report by APWG, the total number of phishing attacks identified in Q1 2024 exceeded 963,000.