Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • February 6, 2025

    Driving Innovation Together — Palo Alto Networks 2024 Partner Awards

    In today’s rapidly evolving threat landscape, partnerships are more critical than ever. Our partners, of all types, are instrumental in helping us stay ahead of these threats and deliver cutting-edge security solutions to protect our customers’ digital transformation journeys. By collaborating with our partners, we can achieve greater operational efficiencies, enhance the end-user experience, and…

    General
  • February 6, 2025

    New AI “agents” could hold people for ransom in 2025

    A paradigm shift in technology is hurtling towards us, and it could change everything we know about cybersecurity. Uhh, again, that is. When ChatGPT was unveiled to the public in late 2022, security experts looked on with cautious optimism, excited about the new technology but concerned about its use in cyberattacks. But two years on,…

    General
  • February 6, 2025

    WhatsApp says Paragon is spying on specific users

    WhatsApp has accused the professional spyware company Paragon of spying on a select group of users. WhatsApp, the Meta-owned, end-to-end encrypted messaging platform, said it has reliable information that nearly 100 journalists and other “members of civil society” were targets of a spyware campaign conducted by the Israeli spyware company. “Members of civil society” usually…

    General
  • February 6, 2025

    10 Cyber Recommendations for the Trump Administration

    Having served our country in the cyberranks of the first Trump Administration, we know how important it is for the second Trump Administration to hit the ground running in its cyber defense mission. As recent events have reinforced, our cyber adversaries – China, Russia, Iran, North Korea and beyond – aren’t sitting on their hands.…

    General
  • February 6, 2025

    How CISOs Can Build a Cybersecurity-First Culture

    Creating an enterprise security-first culture is one of the most impactful things a CISO can do to protect their organization. Sure, high-tech solutions and fancy tools are important, but they are largely ineffective when staff are unable or unwilling to play their part in preventing, identifying, and reporting security incidents. However, in the quest to…

    General
  • February 6, 2025

    Man Sentenced to 7 Years in Prison for Role in $50M Internet Scam

    A California man has been sentenced to seven years in prison for his involvement in a fraudulent scheme that saw over 50 individuals and organisations lose millions of dollars. 59-year-old Allen Giltman, of Irvine, California, pleaded guilty to charges that he and his co-conspirators built a network of fraudulent websites impersonating legitimate financial institutions. According…

    General
  • February 6, 2025

    Zero Trust Principles for Critical Infrastructure Security

    The cyber threat to critical infrastructure has never been greater. The growing sophistication of cybercriminals, deteriorating geopolitical relations, and the convergence of operational technology (OT) and information technology (IT) have created unprecedented risks for critical infrastructure organizations. Fortunately, resources are available to help these organizations protect themselves. In late October 2024, the Cloud Security Alliance…

    General
  • February 6, 2025

    CIS Control 03: Data Protection

    Key Takeaways for Control 3 At the heart of a strong data management plan is awareness surrounding the ‘ Five Ws’ of the enterprise’s data: What data does the enterprise store or handle? Who should have access to it? Where is it stored or accessed? When should it be deleted? Why does it need protection?…

    General
  • February 6, 2025

    Tripwire Patch Priority Index for January 2025

    Tripwire’s January 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the list are patches for the Microsoft office platform, including Word, Access, Visio, Excel, OneNote, and Outlook. These patches resolve 13 issues such as remote code execution and security feature bypass vulnerabilities. Next are patches that affect components of the…

    General
  • February 6, 2025

    What Is a Security Operations Center (SOC)?

    Data breaches continue to cost organizations millions of dollars each year, with costs rising steadily. According to IBM’s 2024 Cost of a Data Breach Report, the average cost of a data breach has surged to $4.88 million globally, reflecting the increasing complexity and sophistication of cyberattacks. In the United States, this figure is even higher,…

    General
Previous Page
1 … 51 52 53 54 55 … 95
Next Page

Designed by Alireza Gharib