Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Closing the IT Skills Gap: How SASE Empowers and Retains Top Talent

In today’s competitive job market, employees are increasingly seeking a sense of purpose and belonging in their work environments. As McKinsey reports, purpose has become a pivotal factor in employee retention. IT leaders who fail to connect their teams’ day-to-day tasks to a broader mission risk losing top talent to organizations that do.

CIO POV: Beware of Deepfakes Infiltrating the Enterprise

Many years ago, the philosopher Phaedrus said, “Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden.” He couldn’t have possibly imagined today’s world, yet his warning encapsulates deepfakes, one of the greatest threats of modern times. As AI advances, digital disinformation is blurring the lines between fact and fiction.

What Happens If You Answer a Spam Call

If you accidentally answer a spam call, scammers know your number is connected to a real person and can target you with more calls. These targeted spam calls will try to trick you into giving up your personal information which allows cybercriminals to steal your money, your identity and even your voice. Learn more about how cybercriminals can exploit you using spam calls.

Do You Need More Than One PAM Solution?

No, you don’t need more than one Privileged Access Management (PAM) solution to protect your organization if you find one that encompasses zero-knowledge security, granular access control, session management and automated password rotation. Previously, your organization may have needed multiple PAM solutions for various tasks; however, KeeperPAM is a unified platform that provides centralized cloud management of privileged access, passwords, secrets and connections.

"Get Beyond Security Awareness Training" Does Not Mean Forgetting About It

KnowBe4 is a big believer in focusing on decreasing human risk as the best way to decrease cybersecurity risk in most environments. A big part of decreasing human risk is using effective security awareness training (SAT). You do not want to just focus on SAT, but SAT is a big part of decreasing human risk. To be sure, your human risk management projects need to be broadly focused on more than SAT. We agree.

Russia's APT29 Launches Major Spear Phishing Campaign

Trend Micro warns that the Russian state-sponsored threat actor Earth Koshchei (also known as “APT29” or “Cozy Bear”) is using spear phishing emails to trick victims into connecting to rogue Remote Desktop Protocol (RDP) relays. “Earth Koshchei’s rogue RDP campaign reached its peak on October 22, when spear-phishing emails were sent to governments and armed forces, think tanks, academic researchers, and Ukrainian targets,” Trend Micro explains.

Uncovering the Hidden Dangers: Corporate Emails on Third-Party Websites

Employees often need to access various online services for work and personal purposes. Whether signing up for industry newsletters, registering for webinars, or using online tools, a corporate email address is a convenient way to manage professional communication. However, this seemingly harmless habit can expose employees and their organizations to significant risks.