Introduction Business Email Compromise (BEC), also known as CEO fraud, is a targeted, skillfully crafted, and rapidly growing cybersecurity threat that involves social engineering techniques
Author: Sanjay More
Introduction The Internet of Things (IoT) is the next wave of automation and “freedom” for consumers and business alike, offering capabilities and computational power to
Introduction Since the outbreak of the Covid-19 pandemic, employees have become all too familiar with the Work From Anywhere (WFA) and Work From Home (WFH)
Introduction Supply Chain Risk is a major issue for businesses and consumers (think Colonial Pipeline or JB Meat Packing). Security incidents have been reported for
Introduction Since its inception, Amazon Sidewalk has been drawing quite a bit of controversy. Cybersecurity professionals are concerned about the security and lack of visibility
Introduction Vulnerability management is a very effective tool to mitigate the risk of a cyber-attack. Security vulnerabilities such as misconfigurations and missing patches can open
We like to think we can trust our co-workers to do the right thing. Unfortunately, this is not always the case. Some people become insider
Introduction In the world of digital warfare, phishing attacks are one of the most dangerous and prevalent cybercrimes organizations are facing today. Fraudsters are using
Introduction Cyber-criminals use back-to-school scams by impersonating trusted educational institutions in their phishing attacks. These hackers aim at stealing either student’s intellectual property or financial
With the recent move for many to working from home, there are a lot of questions around virtual conferencing platforms. Much of the attention has