Blog
Tokenization: Safeguarding Payment Data in an Era of Cybersecurity Threats
August 12, 2024
0 Comment
By Ravi Battula
Payment data security is more important than ever in today’s digital economy. Due to the increase in online transactions, there is a greater chance that financial information will be the target of cyberattacks. Sensitive payment data can now be effectively protected with tokenization. This article explores the notion of tokenization,
By Mickey Bresman
All too often, when a company is breached, the bad actor, through various techniques, escalates privileges until they get ahold of an account such as a domain admin. The bad actor can then download an encryption payload (otherwise known as malware) to encrypt the environment to demand ransom. To increase
Explaining the Ransomware Problem
August 9, 2024
0 Comment
By PJ Bradley
Ransomware has been a formidable threat to organizations for decades—the first variants of modern ransomware were seen in 2005, while cybercriminals were encrypting files and demanding ransoms as far back as 1989. The risks associated with ransomware attacks are diverse and complex, adding up to far more than just the financial cost of
How ransomware is reshaping the regulatory agenda
August 9, 2024
0 Comment
By Dr Darren William
How ransomware is impacting regulations The regulatory world is a notoriously slow-moving one and it typically takes years of proposals, reviews, and redrafts before new regulations finally become law. It makes sense – when it comes to laws that could affect millions of people and reshape aspects of our lives,
By Stu Sjouwerman
Modern ransomware attacks are multi-staged and highly targeted. First, attackers research the target organization and its employees. Traditional ransomware attacks were fairly straightforward. Attackers lured indiscriminate victims using social engineering and phishing tactics. Once victims were tricked into visiting a malicious website or opening a malicious link or attachment, they would execute