Cybersecurity
A CISO’s Guide to Bot Protection Effectiveness – Breaking Open the Black Box
Learn how to validate bot protection effectiveness, mitigate business risks, and ensure your defenses align with operational and regulatory needs ...
Privileged Account Security in Active Directory
Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running ...

Understanding Privileged Access Management (PAM): A Comprehensive Guide
Privileged Access Management (PAM) is crucial in today's threat landscape. This guide explores what PAM is, why it's essential for your organization, and how it safeguards against unauthorized access. Learn about best ...

In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity
Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape ...

What is CICRA Audit and Why It Matters?
Credit Information Companies (Regulation) Act was introduced in India in 2005. It was for organizations that handle customers’ credit information to promote transparency in the credit system as well as protect sensitive ...

Deepfake Fraud, Data Brokers Tracking Military Personnel
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...

The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short
A recent Forbes article by Davey Winder discussed a brilliant publication by Stanford researchers Sheryl Hsu, Manda Tran and Aurore Fass. It was discovered nearly 350 million Chrome extensions installed had privacy ...

Phishing 2.0: Unmasking Modern Cyber Threats and Building Proactive Defences
Phishing has become a cornerstone of cyberattacks in the digital era, evolving into one of the most significant challenges for organizations and individuals alike. The rise of increasingly sophisticated phishing methods has ...

Silent Hacks, Deadly Nights: Protect Yourself from Holiday Cyber Threats
The holiday season is coming up. As the world begins to wind down and celebrate, the holidays are a golden opportunity for cybercriminals. As online shopping surges and people become distracted by ...

Is Cyber Threat Intelligence Worthless?
I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news. There is ...