Affect of SEO Poisoning in Organizations and How to Prevent It?

Affect of SEO Poisoning in Organizations and How to Prevent It?

In today’s digital world, online visibility is crucial for business success. SEO Poisoning has emerged as a harmful attack method in the hands of threat actors. It exploits the very system designed ...
Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy

Deepfake Fraud, Data Brokers Tracking Military Personnel

In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...
The Evolution of Hashing Algorithms: From MD5 to Modern Day

The Evolution of Hashing Algorithms: From MD5 to Modern Day

Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...
Army Not Ready for February SBOM Deadline

Army Not Ready for February SBOM Deadline

Interview with government IT “Reformer” John Weiler By Deb Radcliff, editor of TalkSecure, sponsored by CodeSecure and syndicated at Security Boulevard & YouTube Starting in February 2025, the U.S. Army will require software bills of ...
What is DSPT Compliance: From Toolkit to Audit (2024)

What is DSPT Compliance: From Toolkit to Audit (2024)

The Data Security and Protection Toolkit (DSPT), an online tool, is undergoing significant changes. From September 2024, the DSPT will now align with the National Cyber Security Centre’s Cyber Assessment Framework (CAF) ...
SOC 2 Compliance Audit: Safeguarding Your Business’s Data

SOC 2 Compliance Audit: Safeguarding Your Business’s Data

Are you a service organization seeking an audit to gain customers’ trust? Or maybe you are looking to attract prospective clients by proving how serious you are with customers’ data. If that ...
NIST Security Controls: Deep Dive with Dr. Ron Ross

The Only Guide For NIST 800-53 You Need: Controls List, Control Examples, Challenges, Implementation Tips

NIST, or the National Institute of Standards and Technology, is a U.S. federal government agency that creates frameworks and publications to manage organisations’ security requirements. NIST has released many Special Publications (SP), ...
Ransomware Evolution: From Triple-Quadruple Extortion to RaaS

Ransomware Evolution: From Triple-Quadruple Extortion to RaaS

In 1989, the first ransomware attack was recorded. It was the foundational ground that laid the wave of digital invasions that the world has been witnessing with an attack occuring every two ...
Is It Time to Delete Your Twitter Account? Here's What You Need to Know

Why It’s Time to Leave Twitter

In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for ...
Cyber Crisis Management Plan: Shield for Brand Reputation

Cyber Crisis Management Plan: Shield for Brand Reputation

| | Compliance, Cyber Security
Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is ...