Generative Data Intelligence

Tag: Cyber Defense

Tales from the Trenches Show Security Issues Endemic to Healthcare

The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security...

Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications

Here’s an overview of some of last week’s most interesting news and articles: New wave of attacks aiming to rope home routers into IoT...

Russia: Bitcoin Activity Rising Despite Strict Law Proposals

A branch of the Russian federal government has recently published a draft of new litigation called “On Digital Financial Assets,” which is focused...

Data privacy versus data security: why is it so hard to have both?

The General Data Protection Regulation (GDPR) came into force in May 2018 and the California Consumer Privacy Act (CCPA), the US’s first state...

How to Detect Obfuscated Malware on Your Server

Traditional malware detecting methods are ineffective against the hackers’ new techniques – deploying malware which is obfuscated. That’s why an innovative new...

Long-Term Effects of COVID-19 on the Cybersecurity Industry

The maelstrom of change we're going through presents a unique opportunity to become enablers. And to do that requires flexibility.Experts have written much...

Nomura Partners with Coinshares and Ledger, Launches Komainu

Worldwide venture bank Nomura, advanced resource security organization Ledger, and pioneer computerized resource investment firm CoinShares, share further subtleties of Komainu, a computerized...

Law Decoded: Dead Men Face No Charges, June 6-12

Editor’s note:  These are times strange enough that every conversation seems to include some verbal acknowledgment like “strange times, huh?” A quasi-anarchist police-free leftist...

How is Blockchain Being Applied to Cybersecurity Right Now?

There are numerous practical use cases between blockchain and cybersecurity, and the overlap seems to be only growing larger. With new technologies comes...

Years-Old Cybersecurity Vulnerably Exposed in Blockfolio

As of April 22, there are approximately 5,400 cryptocurrencies being traded with a market value of $201 billion United States dollars. The 24-hour...

Reducing Threat Impact With CIS Controls

Lane Roush, vice-president of Presales Systems Engineering at Arctic Wolf Networks, discusses CIS roles, controls, and tools in this digital summit session. He opens...

Japan Suspects HGV Attack Missile Data Leak in Part of Cyberattack That Hit Mitsubishi Electric Corp

Recently, the Mitsubishi Electric Corp has revealed a major security breach; and in a brief statement released on its website stated that...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?