Hackers are constantly targeting employees to get their hands on sensitive data. It is important for companies to be up-to-date on the latest threats while taking steps to create cybersecurity awareness among all employees. As per IBM Cyber Security Intelligence Index, human error is part of more than 95% of security breaches. A few cyber…
Cybersecurity is new and everyone is talking about it! All that content is great for an enthusiast! It gets the job done! But, are they all relevant for a security professional? For true security folks the bar is set a lot higher and following the true security legends becomes important. To become a legend, one…
In late 2019, US government agencies were grappling with what unfolded to be one of the most sophisticated hacking campaigns – Russian intelligence injected a trojan virus into their network management system provided by a third party. The exploiters briefly managed to gain remote access to sensitive data because the US agencies trusted untested software….
Amid the rapid strides into the digital realm, the accompanying risks loom large. The emergence of Cyber Essentials stands as a pivotal response to these challenges within contemporary cybersecurity. Crafted by the National Cyber Security Centre (NCSC), this nationally recognized certification acts as a cornerstone, erecting a robust defense against prevalent online threats. Its implementation…
In a 2023 report by IBM on the cost of a data breach, researchers found that appointing a CISO can help reduce the possible financial loss due to an incident to a large extent. Organizations that appointed a CISO saved $130,086 on average compared to those without a CISO in place per incident. This clearly…
On November 1, 2023, governor Kathy Hochul announced that the New York State Department of Financial Services had drafted the NYDFS Cybersecurity Regulation. Aimed at protecting New York-based businesses and their customers from cyber threats, these regulations are designed using a combination of risk based approaches with better governance and robust access controls. If you…