Fight a Successful Phish
Phishing is one of the most common cyber crimes, but phishing methods have evolved far beyond suspicious emails with offers that are too good to be true. And while employee education is a crucial part of combatting phishing attempts, the sophistication of these attacks means bad actors are still getting through your protections and into your network. From triple extortion to AI-powered attacks, read about the latest phishing methods and how to identify signs of compromise below.
Tell us what you think by joining the #BeCyberSmart conversation on Twitter and LinkedIn.
What is the difference between threat intelligence and cybersecurity?
Threat intelligence is defined as the continuous activity of gathering, processing, analyzing, and distributing information related to threats that target applications and systems. Cybersecurity differs from threat intelligence in that instead of monitoring the threats, it actively combats attacks.
Are You Prepared for AI Malware?
The concept of using artificial intelligence (AI) in cybersecurity is not new. Indeed, many organizations use AI as part of an in-depth security protocol. The trouble is, hackers now have easy access to the same sophisticated techniques that enterprises do, and they are nothing if not motivated.
Healthcare Sector: An Enticing Target for Cyberattackers
The digital transformation that has happened in the healthcare industry over the last 10 years has been nothing short of remarkable. However, with this new digital world comes complexity and risk, leaving healthcare providers in an alarming position to cope with a new set of challenges.
Triple-Extortion Tactics on the Rise for Ransomware Gangs
The latest involves integrating attacks into a ransomware-as-a-service (RaaS) portfolio to create the so-called triple cyberextortion attack. It’s a little bit ransom, a little bit DDoS extortion, and a lot of trouble.
Cybersecurity After the Pandemic
This paper highlights top cybersecurity events and trends during the pandemic and how the lessons learned will influence post-pandemic service assurance and cybersecurity strategies.