If you are a T-Mobile customer, you might be in line for a settlement check. Following a data breach. $350 million settlement reached in a class-action lawsuit.
Continue ReadingCompliance
23andMe Fine £2.31M for Data Breach
Genetic testing company 23andMe has been hit with a hefty £2.31 million (GBP) fine by the U.K. Information Commissioner’s Office (ICO) for a data breach.
Continue ReadingCloud Security & Disaster Recovery
Organizations are leveraging the cloud for its scalability, cost effectiveness, and crucially, its role in strengthening their disaster recovery posture.
Continue ReadingWhere is Cyber Threat Modeling Used
To combat the cyber threat risks, organizations across various sectors are turning to a crucial practice: Cyber Threat Modeling.
Continue ReadingIncident Response Plan Safeguards
A proactive and well-defined Incident Response Plan (IRP) is critical in mitigating the impact of data breaches and safeguarding your organization.
Continue ReadingCommon Cybersecurity Frameworks
Cybersecurity frameworks provide a structured and comprehensive approach to managing and mitigating cyber risks.
Continue ReadingRed Team Used in Cybersecurity
In cybersecurity traditional defenses are often not enough. Organizations need to proactively identify and address vulnerabilities.
Continue ReadingRisks to Supply Chain Security
The Supply chain is the lifeblood of the global economy. They are networks connecting raw materials, manufacturing, distribution, and the end consumer.
Continue ReadingDefense in Depth
Defense in Depth is a security strategy that implements multiple, overlapping layers of security measures to protect valuable assets.
Continue ReadingKeystroke Logging
This article breaks down the concept of keystroke logging, exploring its mechanics, applications (both legitimate and nefarious).
Continue ReadingRole Based Access Control (RBAC)
Organizations need a system that ensures only authorized individuals can view, modify, or utilize critical information. Enter Role Based Access Control (RBAC).
Continue ReadingFrameworks and Penetration Testing
A robust security strategy is paramount. This strategy often hinges on two key components: security frameworks and penetration testing standards.
Continue ReadingFirewall Configuration is Crucial
A properly configured firewall is no longer a luxury, but a necessity. It serves as the critical first line of defense in safeguarding your network.
Continue Reading