Cybersecurity

Cybersecurity Threats & Attacks

Given the sophistication of cyber-attacks, cybersecurity has become a central focus to protect people and their personal data. Learn more about the common cyber threats we all face in an age when companies are undergoing a digital transformation.

Top news of the week: 05.04.2023.

‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics

‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics

Vulkan engineers have worked for Russian military and intelligence agencies to support hacking operations, prepare for attacks on infrastructure and spread disinformation

As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security

As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security

By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are ...

Infosec products of the month: March 2023

Infosec products of the month: March 2023

The featured infosec products this month are from: 1Password, Appdome, Atakama, BreachLock, Elevate Security, Fastly, Forescout, and more.

World Backup Day Is A Reminder To Back Up Your World

World Backup Day Is A Reminder To Back Up Your World

Protecting our valuable data, whether personal or corporate, requires planning and action. Don’t be an April Fool and start to protect your life and your livelihood now!

Arid Viper Hacking Group Using Upgraded Malware in Middle East Cyber Attacks

Arid Viper Hacking Group Using Upgraded Malware in Middle East Cyber Attacks

Arid Viper hacking group refreshes its malware toolkit and targets Palestinian entities.

Why Endpoint Resilience Matters

Why Endpoint Resilience Matters

In-depth cybersecurity strategies should incorporate endpoint resiliency as an essential component of the overall approach.

How can organizations bridge the gap between DR and cybersecurity?

How can organizations bridge the gap between DR and cybersecurity?

Disaster recovery (DR) and cybersecurity teams integration enhances resilience and cuts operational costs of maintaining separate systems.

Protect your entire business with the right authentication method

Protect your entire business with the right authentication method

Modern MFA methods are becoming essential for businesses to protect against cyber threats and secure remote access to critical resources.