2 min read
The Top Five Ways AI Powers Hacks
Several breach report studies have reported the use of Artificial Intelligence (AI) in breach statistics. As of the 2024 report, 16% of breaches...
2 min read
Several breach report studies have reported the use of Artificial Intelligence (AI) in breach statistics. As of the 2024 report, 16% of breaches...
4 min read
Multi-factor authentication (MFA) is widely considered one of the best affordable controls for preventing account takeover. But like every security...
2 min read
Back in May 2024, I wrote that there were signs ransomware might finally be on the decline. I have continued to monitor various sources regarding...
1 min read
In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...
2 min read
At first glance, geology and cryptography may seem worlds apart—one is the study of rocks, layers, and the passage of deep time; the other, the...
1 min read
In recent years, cybercriminals have expanded their toolkit beyond phishing emails and malware to include a newer, more sinister threat—deepfake...
2 min read
Insider threats are becoming an increasingly serious issue for financial institutions, often developing quietly but with potentially severe...
2 min read
Given the current international climate, it is critical to maintain vigilant and ongoing monitoring of both cyber and physical threats to the...
1 min read
The quantum computing era is quickly approaching, and the capabilities of these powerful machines promise to revolutionize various industries. This...
2 min read
The end of 2024 is approaching quickly and 2025 will be here before we all know it. To plan for a successful cybersecurity posture in 2025, here are...