
UK NHS gets a dose of ransomware
There are concerns that patient data may have been the target of a ransomware attack on a software supplier that affected the NHS...
There are concerns that patient data may have been the target of a ransomware attack on a software supplier that affected the NHS...
Organisations are increasingly exposed to cyber threats, which justifies taking out cybersecurity insurance policies against hacker...
Just-in-time (JIT) privileged access is a method that allows organisations to reduce the attack surface, providing system and application...
Smartphones, tablets, and laptops are considered endpoints, connected to a network terminal. If they are not protected, these devices...
We asked Elena Georgescu from Heimdal Security to tell us what she thinks about why it's important to extend endpoint security with Zero...
Back after a sabattical, craftier than before After a four-year sabbatical, the infamous Amadey Bot malware has returned with even more...
Mounting Denial-of-Service (DDoS) attacks is undoubtedly an arcane tactic considering the evolutionary timeline of cyber-defenses, but...
Ransomware attacks are one of the biggest fears of companies today. Imagine having to use your business resources to pay cybercriminals....
With the emergence of cloud-based technologies, there is a growing demand and the consequent increase in services offered in this format....
The Observation ExtraHop analysts observed a machine in a customer's network that was using Google for DNS. In production, you typically...
WRITTEN BY THE KIUWAN TEAM Experienced developers, cyber-security experts, ALM consultants, DevOps gurus and some other dangerous...
WRITTEN BY THE KIUWAN TEAM Experienced developers, cyber-security experts, ALM consultants, DevOps gurus and some other dangerous...
Active Directory started with Windows Server due to the convenience of using the same password to perform several activities in a...
Information security does not only depend on investment in technology. To be effective within the corporate context, it is of paramount...
Cyberattacks on healthcare organizations have increased in recent years. As we have already stated on our blog, this is due to the...
Password strength is one of the criteria considered when creating password policies. After all, this is one of the most efficient...
Free and open WiFi isn’t a luxury anymore. It’s a necessity and demanded by people everywhere. In 2022, companies could be doing more to...
Best Practices on Data Leakage Prevention. Data leakage, frequently called information leakage, is the unauthorized disclosure of...
If an organization uses open source software (OSS) dependencies, it should be on the red alert for supply chain attacks. Cyber threat...
Cyber attacks happen every 39 seconds. The University of Maryland found that these attacks affect almost 1 in 3 Americans every year. As...