Career Profile: Kirsty Paine, Splunk
Name: Kirsty Paine Affiliation: Splunk Can you briefly introduce your current role in cybersecurity? As Strategic Advisor in Technology &
Read moreName: Kirsty Paine Affiliation: Splunk Can you briefly introduce your current role in cybersecurity? As Strategic Advisor in Technology &
Read moreDigital forensics and incident response (DFIR) are a routine part of ensuring the business has a good security posture. Investigations
Read moreFirmware security risks One of the most neglected areas of cyber security is the firmware that underpins every device –
Read moreThe supply chain sector has always been a magnet for theft and fraud, but these risks multiply in the age
Read moreA comprehensive cybersecurity strategy involves data recovery now more than ever. A solid plan could save organizations from the most
Read moreIn the wake of sophisticated and expensive network security measures, protecting the lowly email server often gets missed. However, attackers count on this and have made even greater inroads into an already lucrative route for malware. Verizon’s 2022 Data Breach Investigations Report notes that email is still one of the two top delivery methods for malicious payloads, and the median organization receives three out of four malware payloads in this way.
Read moreName: Dr. Silke Holtmanns Affiliation: PwC Finland – 5G Security Team Can you briefly introduce your current role in cybersecurity?
Read moreThe world is a visual place. Communication with photos and short videos has now become commonplace thanks to applications like Instagram and TikTok. Photos are easily taken from accessible devices and used to share information such as events, news, and even emotions at a rate and speed unlike anything before. But what many may not realise is that photos can also be used to inconspicuously share data or carry out a cyber-attack.
The practice of concealing messages, images, or files within other messages, images, or files is called steganography. It comes from the Greek word steganos (covered) and the Latin word graphia (graphy). With the popularity of photos and images, this hacking method will likely increase and continue to see success.
If there’s one thing businesses should always focus on, it’s user experience (UX). If users aren’t having a good experience with your product, brand, or another aspect of your business, your company’s bottom line is suffering because of it. Increasingly, cybersecurity is becoming a big part of the user’s experience. Keep reading to find out more about how the two intersect, and how you can apply UX design to cybersecurity.
Read moreIn the last few years, many large businesses have overhauled their approach to cyber security. The rise of remote working forced them to bring forward long-planned upgrades to both security technology and processes, resulting in far better data security across the board.
On paper it seems like very good news, but it isn’t necessarily for everyone. Why? Because the majority of cyber criminals are opportunists looking for the quickest and easiest way to make the maximum amount of money possible from victims. Consequently, they tend to target larger businesses that have more assets for exploitation. However, as these large businesses continue to shore up their cyber defences, cyber criminals have started looking elsewhere for easier targets, and many of them are turning their attention to lesser protected mid-market enterprises instead.