Cyber Risk

Is the US Prepared for Cyber Threats from Salt Typhoon?
Security Operations & Management Is the US Prepared for Cyber Threats from Salt Typhoon?

As cyber threats continue to evolve at an unprecedented pace, the United States faces an increasingly challenging landscape marked by sophisticated adversaries. One of the most pressing concerns is the threat posed by "Salt Typhoon," a cyber group reportedly backed by China, which has

Can We Balance Innovation and Security in the AI Race?
Security Operations & Management Can We Balance Innovation and Security in the AI Race?

The global race for Artificial Intelligence (AI) supremacy is intensifying as organizations, governments, and suppliers strive to harness the benefits of AI technology, pushing boundaries in a bid to gain competitive advantages. This pursuit doesn't only play out in the business arena but also

How Are Attackers Using Docker for Novel Cryptojacking?
Infrastructure & Network Security How Are Attackers Using Docker for Novel Cryptojacking?

Out of all the services targeted by Darktrace, Docker has emerged as the most frequently attacked platform, showcasing an ongoing evolution in cyber threats with new malware strains appearing daily. This article will delve into a distinct malware attack featuring a unique obfuscation method and an

How Can AI Outsmart and Defend Against Rapidly Evolving Identity Fraud?
Security Operations & Management How Can AI Outsmart and Defend Against Rapidly Evolving Identity Fraud?

Artificial intelligence (AI) is revolutionizing many fields, including cybersecurity. As identity fraud becomes increasingly sophisticated, AI technologies are being deployed both by attackers to create more convincing false identities and by defenders to develop robust security measures. This

How Can Integrated GRC Transform ESG, Cyber, and Regulatory Risks?
Security Operations & Management How Can Integrated GRC Transform ESG, Cyber, and Regulatory Risks?

The rapidly evolving landscape of business risks necessitates a shift from traditional, siloed Governance, Risk, and Compliance (GRC) frameworks to integrated models that encompass Environmental, Social, and Governance (ESG) considerations, cybersecurity threats, and regulatory requirements.

Can Small Businesses Afford to Ignore Threat Intelligence?
Security Operations & Management Can Small Businesses Afford to Ignore Threat Intelligence?

The digital landscape is becoming increasingly treacherous, particularly for small businesses that might assume their size grants them some immunity. Some industry statistics reveal that 41% of US small businesses recently experienced cyberattacks. With the median cost of these attacks surging to

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later