Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattack Spotlight: The Zero-Day Exploit

A zero-day attack takes advantage of a weakness in a target’s network, software, or infrastructure—without the target even knowing. These type of cyber attacks can be devastating because the attack will continue unimpeded until it’s eventually spotted (that’s if it’s spotted at all). This article shines a spotlight on the danger. We define the features of zero-day incidents and consider some famous case studies.

Advanced Medical Management Suffered a Data Breach Impacted Nearly 320K People

Advanced Medical Management is a technical and healthcare management service that offers administrative and technical support to healthcare companies. The provider works with large-scale companies and their data in the process. It was alarming to learn the company suffered from a recent data breach, making its information available to individuals that shouldn't have it.

Random but Memorable: People's Choice Bonus Episode

Surprise! We're back for a very short and sweet bonus episode. 🥳 🏆 We've been nominated for the 2023 People’s Choice Podcast Awards in the This Week in Tech – Technology category! You can help us win our first award – support the show by signing-up and voting for Random but Memorable today! 🏆 It would mean a lot to our team if you could spare a few minutes to vote.

Keeping your SLED Secure: Should you pay a ransom?

In this week's episode, Bill and Robin respond to a viewer request, and delive into the world of State, Local Government and Education, and how they can stay protected and secured with limited budgets. We cover documents issued by the FBI regarding how to stay safe, and also discuss how some OEM vendors are advocating that SLED organisations should just pay whatever ransom has been asked. Will this make the threat actors go away, or will they be here to extort another day?

AI is the Future of Cybersecurity. Here Are 5 Reasons Why.

While Gen AI tools are useful conduits for creativity, security teams know that they’re not without risk. At worst, employees will leak sensitive company data in prompts to chatbots like ChatGPT. At best, attack surfaces will expand, requiring more security resources in a time when businesses are already looking to consolidate. How are security teams planning to tackle the daunting workload? According to a recent Morgan Stanley report, top CIOs and CISOs are also turning to AI.