background.png

The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Posts by Topic

see all

Get Updates from Us!

Wanna Cry? The anatomy of the Recent attack

Last weekend, in the biggest attack of its kind ever recorded, the ransomware known as WannaCry/WanaCrypt0r 2.0 has swept organizations of all shapes and sizes across 167 countries.

Read More

How Social Media Becomes a Weapon against your Digital Brand

Social media is increasingly used by cybercriminals as an attack vector to run scams and carry out malicious attacks, ranging from account hijacking to impersonation of key employees. As social media ...

Read More

Cybersecurity Action Plan for 2017

  Faced with an evolving threat landscape and proliferating attack vectors, it is imperative for CISOs to stay ahead of the threat actors. If success is where preparation and opportunity meet, as the ...

Read More

3 Trends Shaping Retail Cybersecurity in 2017

I have just spent a couple of days with the top retailers in APAC, talking about digitalization and the risks this transformation presents to retailers globally. There is a shared concern among ...

Read More

Sentry MBA: A Tale of the Most Popular Credential Stuffing Attack Tool

According to Verizon’s latest annual data breach study, last year “63% of confirmed data breaches involved leveraging weak/default/stolen passwords.” In many cases, intruders rely on reused, stolen ...

Read More

We Are in This Together: Every department can put an enterprise at risk

Protecting an enterprise’s digital assets requires more than the labor of the IT/IS teams - fighting cybercrime calls for a joint effort from each and every department. From the C-level suites, down ...

Read More

The Rise of Digital MDRs

The “wild west” of cybersecurity could use another good guy, and Managed Detection and Response services (MDRs) promise to deliver an effective way to manage, detect and respond to complex attacks ...

Read More

Cyberwar, US, Russia and the non-State Actors: Frenemies with Benefits?

The past year has been compounded with multiple events and mounting evidence to suggest that the USA and Russia have entered ever-escalating cyber hostilities. Private email accounts of politicians ...

Read More

What’s in a name: Who Names Cyber Attacks?

Pork Explosion? I couldn’t help but laugh at the name of a recent security vulnerability. The name wasn’t a nod to an all-you-can-eat pork buffet. No, Pork Explosion is the name of an Android device ...

Read More

Must-attend Events for Cybersecurity Professionals

There will be many developments in cybersecurity in 2017, and there’s no better way of getting ahead of these trends than by attending an industry conference.

Read More

SUBSCRIBE

download.jpg