-
Driving Innovation Together — Palo Alto Networks 2024 Partner Awards
In today’s rapidly evolving threat landscape, partnerships are more critical than ever. Our partners, of all types, are instrumental in helping us stay ahead of these threats and deliver cutting-edge security solutions to protect our customers’ digital transformation journeys. By collaborating with our partners, we can achieve greater operational efficiencies, enhance the end-user experience, and…
-
New AI “agents” could hold people for ransom in 2025
A paradigm shift in technology is hurtling towards us, and it could change everything we know about cybersecurity. Uhh, again, that is. When ChatGPT was unveiled to the public in late 2022, security experts looked on with cautious optimism, excited about the new technology but concerned about its use in cyberattacks. But two years on,…
-
WhatsApp says Paragon is spying on specific users
WhatsApp has accused the professional spyware company Paragon of spying on a select group of users. WhatsApp, the Meta-owned, end-to-end encrypted messaging platform, said it has reliable information that nearly 100 journalists and other “members of civil society” were targets of a spyware campaign conducted by the Israeli spyware company. “Members of civil society” usually…
-
10 Cyber Recommendations for the Trump Administration
Having served our country in the cyberranks of the first Trump Administration, we know how important it is for the second Trump Administration to hit the ground running in its cyber defense mission. As recent events have reinforced, our cyber adversaries – China, Russia, Iran, North Korea and beyond – aren’t sitting on their hands.…
-
How CISOs Can Build a Cybersecurity-First Culture
Creating an enterprise security-first culture is one of the most impactful things a CISO can do to protect their organization. Sure, high-tech solutions and fancy tools are important, but they are largely ineffective when staff are unable or unwilling to play their part in preventing, identifying, and reporting security incidents. However, in the quest to…
-
Man Sentenced to 7 Years in Prison for Role in $50M Internet Scam
A California man has been sentenced to seven years in prison for his involvement in a fraudulent scheme that saw over 50 individuals and organisations lose millions of dollars. 59-year-old Allen Giltman, of Irvine, California, pleaded guilty to charges that he and his co-conspirators built a network of fraudulent websites impersonating legitimate financial institutions. According…
-
Zero Trust Principles for Critical Infrastructure Security
The cyber threat to critical infrastructure has never been greater. The growing sophistication of cybercriminals, deteriorating geopolitical relations, and the convergence of operational technology (OT) and information technology (IT) have created unprecedented risks for critical infrastructure organizations. Fortunately, resources are available to help these organizations protect themselves. In late October 2024, the Cloud Security Alliance…
-
CIS Control 03: Data Protection
Key Takeaways for Control 3 At the heart of a strong data management plan is awareness surrounding the ‘ Five Ws’ of the enterprise’s data: What data does the enterprise store or handle? Who should have access to it? Where is it stored or accessed? When should it be deleted? Why does it need protection?…
-
Tripwire Patch Priority Index for January 2025
Tripwire’s January 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the list are patches for the Microsoft office platform, including Word, Access, Visio, Excel, OneNote, and Outlook. These patches resolve 13 issues such as remote code execution and security feature bypass vulnerabilities. Next are patches that affect components of the…
-
What Is a Security Operations Center (SOC)?
Data breaches continue to cost organizations millions of dollars each year, with costs rising steadily. According to IBM’s 2024 Cost of a Data Breach Report, the average cost of a data breach has surged to $4.88 million globally, reflecting the increasing complexity and sophistication of cyberattacks. In the United States, this figure is even higher,…