-
Cloudflare reports record-breaking HTTP-request DDoS attack
Cloudflare reports thwarting the largest known HTTP-request distributed denial of service attack in history, approximately three times larger than any other previously reported. The attack in July reached 17.2 million requests per second, the company wrote in a blog post. For scale, the entirety of the Cloudflare network typically sees around 25 million requests per second…
-
SOC as a Service Market by Component, Service Type (Prevention, Detection, & Incident Response),
The SOC as a Service market place is actually projected to grow from USD 471 million in 2020 to USD 1,656 million by 2025, at a Compound Annual Growth Rate (CAGR) of 28.6 % throughout the forecast period. The escalating venture capital funding and increasing investments in SOC as a Service know-how to operate the…
-
Humans: The Greatest Asset in Cybersecurity
The myth that humans are the weakest link in cybersecurity has persisted for too long. While it’s true that human errors can lead to vulnerabilities, and do indeed cause breaches or incidents, this well repeated narrative overlooks a critical truth: when properly empowered and supported, humans are not just a liability to manage—they are your…
-
INTERPOL Retires Pig Butchering: Rethinking Fear-Based Cybersecurity Language
When INTERPOL recently announced they would stop using the term “pig butchering” in favor of “romance baiting,” it reminds me that we’re overdue for another conversation here on the Cybermaniacs Blog about how we use language and create shared meaning through words, in our unique domain of cybersecurity. Go to Source
-
Cybersecurity Culture Transformation: Microsoft’s Digital Defense Report
The annual release of Microsoft’s Digital Defense Report is always a milestone moment for the cybersecurity industry. For us, as an organization deeply invested in reshaping how companies address human risk, it serves as both a benchmark of how we are all working to build effective cyber defenses. This year’s report, packed with insights on…
-
Incident Response:How to Help Employees When Cyber Threats Strike
Imagine your organization’s cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a healthy body can fight off infections or the same defensive posture will snap into place in a well trained police unit, Cyber Resilience in the Human Landscape means the ability for every…
-
How to Prepare for the NIS2 Directive
The Network and Information Security Directive, known as NIS2 and effective beginning October 17, 2024, requires Member States to adopt and publish the national measures necessary to ensure compliance with the directive. Industrial organizations will have 21 months to bring their operations into full compliance. Go to Source
-
Understanding the TAKE IT DOWN Act: What It Means for Digital Safety and Cyber Awareness
Discover what the TAKE IT DOWN Act is, why it matters for combating AI deepfakes and non-consensual imagery, and what’s next in the fight to enhance digital safety and protect personal privacy. Go to Source
-
Enhanced Phishing Training: Dealing with Today’s Threats
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device to the office network, right? Go to Source
-
Essential Best Practices for Cyber Awareness Training
“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” – Captain Jack Sparrow Go to Source