-
Incident Response:How to Help Employees When Cyber Threats Strike
Imagine your organization’s cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a healthy body can fight off infections or the same defensive posture will snap into place in a well trained police unit, Cyber Resilience in the Human Landscape means the ability for every…
-
Cybersecurity Culture Transformation: Microsoft’s Digital Defense Report
The annual release of Microsoft’s Digital Defense Report is always a milestone moment for the cybersecurity industry. For us, as an organization deeply invested in reshaping how companies address human risk, it serves as both a benchmark of how we are all working to build effective cyber defenses. This year’s report, packed with insights on…
-
INTERPOL Retires Pig Butchering: Rethinking Fear-Based Cybersecurity Language
When INTERPOL recently announced they would stop using the term “pig butchering” in favor of “romance baiting,” it reminds me that we’re overdue for another conversation here on the Cybermaniacs Blog about how we use language and create shared meaning through words, in our unique domain of cybersecurity. Go to Source
-
Enhanced Phishing Training: Dealing with Today’s Threats
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device to the office network, right? Go to Source
-
Understanding the TAKE IT DOWN Act: What It Means for Digital Safety and Cyber Awareness
Discover what the TAKE IT DOWN Act is, why it matters for combating AI deepfakes and non-consensual imagery, and what’s next in the fight to enhance digital safety and protect personal privacy. Go to Source
-
How to Prepare for the NIS2 Directive
The Network and Information Security Directive, known as NIS2 and effective beginning October 17, 2024, requires Member States to adopt and publish the national measures necessary to ensure compliance with the directive. Industrial organizations will have 21 months to bring their operations into full compliance. Go to Source
-
Your Digital Footprint: How AI Tracks and Uses Your Online Activity
Whenever you’re surfing the internet, every click, search, and scroll leaves behind a small trace known as a digital footprint. While it might seem harmless to browse your favorite websites or interact on social media, artificial intelligence (AI) algorithms are monitoring and analyzing every digital action. These algorithms can build detailed profiles based on your…
-
Essential Best Practices for Cyber Awareness Training
“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” – Captain Jack Sparrow Go to Source
-
Understanding Credential Stuffing
Imagine your personal login details being swiped from one site, then used to break into your accounts elsewhere. Sounds intrusive, right? Go to Source