Hacktivism’s changing faces
Online hacktivism is not new: it has been around almost as long as the public internet. But the make up, and goals, of hacktivist groups has changed over the years. Today’s hactivist is less likely […]
Online hacktivism is not new: it has been around almost as long as the public internet. But the make up, and goals, of hacktivist groups has changed over the years. Today’s hactivist is less likely […]
AI brings both risks and challenges to cybersecurity. Bad actors can use AI tools for target reconnaissance, to make phishing attacks more believable and potentially, to find vulnerabilities in the wild. But there are also […]
Stress and workplace burnouts are growing problems in the cybersecurity industry. A degree of stress perhaps goes with the territory: cybersecurity is, after all, a fast-paced industry. And responding to a cyber attack is always […]
Cybersecurity and geopolitics are more tightly linked than ever. The growth of online espionage, attacks by state actors, and governments turning a blind eye to cybercrime, are all increasing risk. And the “attack surface” is […]
In the online world, do we really know who we are speaking to? The rise of deepfakes is challenging our assumptions about identity, and even how to tell if we are dealing with another human. […]
The average mid-sized company now uses over 200 Software as a Service, or SaaS, applications. And worldwide there are some 30,000 SaaS applications to choose from, from general office productivity to industry niches. And the […]
The global cybersecurity industry is growing rapidly. But it is also fragmented. This is especially the case in Europe, which has more smaller cybersecurity firms. Even so, the market is worth some $50bn and is […]
In this episode, we dive into the world of cyber escape rooms, and “experiential learning”. Will we find out way out? It’s long been a challenge for CISOs to deliver security training, and build security […]
As many as 90 per cent of security breaches involve human error or social engineering. So how do we reduce the risks from human behaviour? In this, the second of our short series exploring the […]
People pose the greatest risk to cybersecurity. Most cybersecurity breaches either start with, or exploit, human error. People make mistakes. They fall victim to social engineering. Or they fail to set up their systems and […]
Copyright © 2024 | MH Magazine WordPress Theme by MH Themes