Image Extortion: A Sinister new Tactic for Ransomware
Ransomware groups are less interested in encrypting data, and more interested in exfiltrating personal data, utilizing image extortion, to humiliate, and shame victims into paying up.
What do you Need to Know When Creating a Data Breach Investigation and Mitigation Checklist?
Ask these key questions as part of your data breach investigation and mitigation checklist to stand the best chance of recovering from a data breach.
Beyond Cybersecurity Compliance: Adhering to Regulation is Not Enough
Achieving cybersecurity compliance is a top priority, yet can’t guarantee positive outcomes by simply checking compliance boxes
Most Impactful Ransomware Attacks of 2023
We take a look at the top ransomware attacks of 2023 so far and what has been the most impactful on a global scale.
The Data Exfiltration Techniques You Need to be Aware of
What data exfiltration techniques are being used to target businesses with threats such as ransomware in 2023?
Gambling on Cyber Defense
Should you be gambling on cyber defense if you are in the gaming industry when it has become such a firm target in recent years by major cyber gangs.
What You Need to Know About Zero Trust Identity and Access Management
Why should firms be implementing a zero trust identity and access management policy to improve their data security?
What we know about the MOVEit exploit and ransomware attacks
The Clop ransomware group has created the MOVEit exploit using a zero-day vulnerability in third-party file transfer software MOVEit Transfer.
Podcast: DLP is Dead – Long Live Data Exfiltration
DLP is dead discusses how Data Loss Prevention (DLP) strategy may no longer suffice when it comes to safeguarding an enterprise.









