Cyber Security

Affect of SEO Poisoning in Organizations and How to Prevent It?
In today’s digital world, online visibility is crucial for business success. SEO Poisoning has emerged as a harmful attack method in the hands of threat actors. It exploits the very system designed ...

Deepfake Fraud, Data Brokers Tracking Military Personnel
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...

The Evolution of Hashing Algorithms: From MD5 to Modern Day
Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...

Army Not Ready for February SBOM Deadline
Interview with government IT “Reformer” John Weiler By Deb Radcliff, editor of TalkSecure, sponsored by CodeSecure and syndicated at Security Boulevard & YouTube Starting in February 2025, the U.S. Army will require software bills of ...

What is DSPT Compliance: From Toolkit to Audit (2024)
The Data Security and Protection Toolkit (DSPT), an online tool, is undergoing significant changes. From September 2024, the DSPT will now align with the National Cyber Security Centre’s Cyber Assessment Framework (CAF) ...

SOC 2 Compliance Audit: Safeguarding Your Business’s Data
Are you a service organization seeking an audit to gain customers’ trust? Or maybe you are looking to attract prospective clients by proving how serious you are with customers’ data. If that ...

The Only Guide For NIST 800-53 You Need: Controls List, Control Examples, Challenges, Implementation Tips
NIST, or the National Institute of Standards and Technology, is a U.S. federal government agency that creates frameworks and publications to manage organisations’ security requirements. NIST has released many Special Publications (SP), ...

Ransomware Evolution: From Triple-Quadruple Extortion to RaaS
In 1989, the first ransomware attack was recorded. It was the foundational ground that laid the wave of digital invasions that the world has been witnessing with an attack occuring every two ...

Why It’s Time to Leave Twitter
In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for ...

Cyber Crisis Management Plan: Shield for Brand Reputation
Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is ...