Cybersecurity

How to strengthen email security and protection against advanced ransomware attacks

Cybercrime is evolving and phishing attacks are becoming more targeted. Still, some 75 percent of ransomware attacks continue to originate from email, with attackers working together to hunt down the smallest of openings to generate multi-million-dollar ransoms. Cyber Security Hub’s research reveals that phishing and social engineering attacks remain the biggest threats to organizations in […]

Cybersecurity

Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visibility & Enablement

Cloud migration led to cloud evolution which has led to a cloud-first mindset. With a pandemic push, global corporate enterprise has gravitated to the exponential perimeter. The four cornerstones of cloud security now must be realized. Accountability: With a hat-tip to the RACI matrix, identifying responsibility Strategy: Envisioning a cloud security roadmap moving […]

Cybersecurity

DevSecOps Report

Today, DevOps is seen as a crucial way to reduce application vulnerability and increase speed to market by baking security into the development process.While the benefits are undisputed, the challenge to doing DevSecOps well lies in the ability to successfully integrate the previously distinct development and security structures within an organisation, talent shortages and effectively […]

Cybersecurity

CS Hub Mid-Year Market Report 2022

Heightened cyber threats from state-supported groups, the evolution of threat actors’ tactics and the ongoing trend for remote working have combined with the ongoing skills shortages within the cyber security sector to place further pressure on CISOs. The publication of the CS Hub Mid-Year Market Report 2022 offers a timely analysis of trends, innovations and […]

Cybersecurity

PSNI suffers ‘critical’ data breaches

The Police Service of Northern Ireland (PSNI) suffered a “critical incident” on August 8, after the personally identifying information for all of its employees was published online. The “monumental” data breach occurred when data was mistakenly posted online following a Freedom of Information (FoI) request. A database, which included the surname, initials, rank/grade, role and […]