User Behavior

How Can AI-Powered Tools Enhance Customer Data Security?
Data Protection & Privacy How Can AI-Powered Tools Enhance Customer Data Security?

The digital age, while offering vast conveniences and access, has also brought a daunting challenge: the protection of customer data amidst a surge in identity security breaches. Hackers are increasingly targeting dormant accounts laden with sensitive information, making the security of customer

November 6, 2024
How Are ASU Scientists Shaping the Future of Cybersecurity?
Infrastructure & Network Security How Are ASU Scientists Shaping the Future of Cybersecurity?

The rapid integration of technology in our daily lives has ushered in a new era of cybersecurity challenges. In response, a trio of researchers from Arizona State University’s Global Security Initiative's Center for Cybersecurity and Trusted Foundations is pioneering innovative approaches to p

October 25, 2024
SmartRisk Agent™ Elevates Human Risk Management with AI Integration
Security Operations & Management SmartRisk Agent™ Elevates Human Risk Management with AI Integration

In a significant leap forward for Human Risk Management (HRM), the SmartRisk Agent™ has been introduced as an advanced tool for evaluating user risk within organizations. Developed by KnowBe4, this innovative technology replaces the earlier Virtual Risk Officer and enhances the capability to manage

October 15, 2024
How Are Cybercriminals Exploiting Trusted File Hosting Services?
Infrastructure & Network Security How Are Cybercriminals Exploiting Trusted File Hosting Services?

Cybercriminals are increasingly turning to trusted file hosting services such as SharePoint, OneDrive, and Dropbox to launch sophisticated attacks. This trend leverages the trust users have in these platforms to bypass security measures and execute malicious activities. Understanding this evolving

October 8, 2024
Bridging Gaps in Zero Trust: Enhancing ZTNA for SaaS Security
Infrastructure & Network Security Bridging Gaps in Zero Trust: Enhancing ZTNA for SaaS Security

In the dynamic landscape of cybersecurity, the zero trust model has emerged as a critical strategy for safeguarding digital infrastructure. However, Zero Trust Network Access (ZTNA), a core component of zero trust architecture, has shown limitations, particularly when it comes to securing Software

August 28, 2024
How Are Cybercriminals Using Legitimate Cloud Services for Phishing?
Infrastructure & Network Security How Are Cybercriminals Using Legitimate Cloud Services for Phishing?

The landscape of cyber threats is constantly evolving, and cybercriminals are always on the lookout for new methods to breach security defenses. In recent times, there has been a notable shift in their tactics. Instead of depending on traditional malware-laden attachments, attackers have started

August 21, 2024
Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later