Blog
How to build an effective cyber attack response plan
December 27, 2023
0 Comment
By James Bore
When a cyber security incident is in progress – and everything is metaphorically (or literally, if you’re really unlucky) on fire – is not the time to try and build a response plan. Various types of plans come together to truly build an effective plan for a malicious cyber attack.
Eight Cybersecurity Trends To Watch For 2024
December 27, 2023
0 Comment
By Michelle Drolet
In 2024, for cybersecurity, we’re entering an era where advanced AI tools and intricate social engineering tactics (especially during election years) are changing the game. To avoid potential cyber threats, businesses, governments and individuals must grasp these emerging trends. 1. Rise Of Cybersecurity AI In 2024, AI’s role in cybersecurity
5 steps to navigate cyberthreats during this holiday season
December 26, 2023
0 Comment
By Shibu Paul
The holiday season is a time for celebration and well-earned vacations. But amidst the festive spirit, a lurking threat emerges for businesses: cyberattacks. While businesses slow down to celebrate, hackers often accelerate their activities, aiming to exploit vulnerabilities in the holiday chaos. Several factors make the year-end particularly attractive for
Cyber Badness: 12 Top Hacks, Data Breaches, Missteps of 2023
December 26, 2023
0 Comment
By Mathew J. Schwartz
Innovation, cyberattacks and cyberespionage, and data breaches – malicious or inadvertent – have remained a constant. At the same time, defenders have scored notable victories, including in Ukraine as well as by disrupting some big-name ransomware players. Here are 12 notable incidents and trends of 2023 and their implications for
5 Ways Businesses Can Prepare for New Cyber Resiliency Rules
December 22, 2023
0 Comment
By Kris Lovejoy
As critical infrastructure industries embrace digitization, ensuring the resilience of their digital systems and infrastructure becomes crucial to maintain the continuity of operations and protect against cybersecurity breaches or disruptions. The European Union and the U.S. have taken the lead in seeking to normalize and codify safer practices for managing