-
Microsoft announces recipients of academic grants for AI research on combating phishing
Every day in the ever-changing technology landscape, we see boundaries shift as new ideas challenge the old status quo. This constant shift is observed in the increasingly sophisticated and connected tools, products, and services people and organizations use on a daily basis, but also in the security that needs to be built into these technologies…
-
SOC as a Service Market by Component, Service Type (Prevention, Detection, & Incident Response),
The SOC as a Service market place is actually projected to grow from USD 471 million in 2020 to USD 1,656 million by 2025, at a Compound Annual Growth Rate (CAGR) of 28.6 % throughout the forecast period. The escalating venture capital funding and increasing investments in SOC as a Service know-how to operate the…
-
Humans: The Greatest Asset in Cybersecurity
The myth that humans are the weakest link in cybersecurity has persisted for too long. While it’s true that human errors can lead to vulnerabilities, and do indeed cause breaches or incidents, this well repeated narrative overlooks a critical truth: when properly empowered and supported, humans are not just a liability to manage—they are your…
-
Incident Response:How to Help Employees When Cyber Threats Strike
Imagine your organization’s cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a healthy body can fight off infections or the same defensive posture will snap into place in a well trained police unit, Cyber Resilience in the Human Landscape means the ability for every…
-
Cybersecurity Culture Transformation: Microsoft’s Digital Defense Report
The annual release of Microsoft’s Digital Defense Report is always a milestone moment for the cybersecurity industry. For us, as an organization deeply invested in reshaping how companies address human risk, it serves as both a benchmark of how we are all working to build effective cyber defenses. This year’s report, packed with insights on…
-
INTERPOL Retires Pig Butchering: Rethinking Fear-Based Cybersecurity Language
When INTERPOL recently announced they would stop using the term “pig butchering” in favor of “romance baiting,” it reminds me that we’re overdue for another conversation here on the Cybermaniacs Blog about how we use language and create shared meaning through words, in our unique domain of cybersecurity. Go to Source
-
Enhanced Phishing Training: Dealing with Today’s Threats
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device to the office network, right? Go to Source
-
Understanding the TAKE IT DOWN Act: What It Means for Digital Safety and Cyber Awareness
Discover what the TAKE IT DOWN Act is, why it matters for combating AI deepfakes and non-consensual imagery, and what’s next in the fight to enhance digital safety and protect personal privacy. Go to Source
-
How to Prepare for the NIS2 Directive
The Network and Information Security Directive, known as NIS2 and effective beginning October 17, 2024, requires Member States to adopt and publish the national measures necessary to ensure compliance with the directive. Industrial organizations will have 21 months to bring their operations into full compliance. Go to Source
-
Your Digital Footprint: How AI Tracks and Uses Your Online Activity
Whenever you’re surfing the internet, every click, search, and scroll leaves behind a small trace known as a digital footprint. While it might seem harmless to browse your favorite websites or interact on social media, artificial intelligence (AI) algorithms are monitoring and analyzing every digital action. These algorithms can build detailed profiles based on your…