Online scams are increasingly prolific because they piggyback on human weaknesses rather than software vulnerabilities that take significant effort to…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
The scourge of ransomware is mutating into a phenomenon with two-pronged extortion at its core. It used to rely solely…
“With the COVID-19 pandemic continuing to rage across the world, governments of many countries have encouraged or demanded that employees…
A recent English High Court decision means that extorted cryptocurrency payments may now be recovered by obtaining an injunction. The…
As global economies continue in the fight against COVID-19, millions of people around the world are working from home to…
Most people associate a cyber-attack with things like phishing, exploitation of software vulnerabilities, RDP hacks, and sketchy websites hosting malicious…
Kubernetes is fast becoming a cornerstone technology for organisational agility, development speed, and business growth. While it was quickly adopted…
Managing scaling challenges as more employees and devices log on remotely COVID-19 is forcing us to rapidly shift our daily…
In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to…
As organizations become global, often so do their security teams. Increasingly, CISOs are being asked to staff and organize security…