corporate
-
FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks
The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams…
Read More » -
How to Automate the Hardest Parts of Employee Offboarding
According to recent research on employee offboarding, 70% of IT professionals say they’ve experienced the negative effects of incomplete IT…
Read More » -
Three Ways Varonis Helps You Fight Insider Threats
What do basketball teams, government agencies, and car manufacturers have in common? Each one has been breached, having confidential, proprietary,…
Read More » -
Experts Expose Farnetwork’s Ransomware-as-a-Service Business Model
Cybersecurity researchers have unmasked a prolific threat actor known as farnetwork, who has been linked to five different ransomware-as-a-service (RaaS)…
Read More » -
Hands on Review: LayerX’s Enterprise Browser Security Extension
The browser has become the main work interface in modern enterprises. It’s where employees create and interact with data, and…
Read More » -
ServiceNow Data Exposure: A Wake-Up Call for Companies
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in “unintended access” to…
Read More » -
Microsoft Warns as Scattered Spider Expands from SIM Swaps to Ransomware
The prolific threat actor known as Scattered Spider has been observed impersonating newly hired employees in targeted firms as a…
Read More » -
The Rise of S3 Ransomware: How to Identify and Combat It
In today’s digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as the…
Read More » -
Who’s Experimenting with AI Tools in Your Organization?
With the record-setting growth of consumer-focused AI productivity tools like ChatGPT, artificial intelligence—formerly the realm of data science and engineering…
Read More » -
Exploring the Realm of Malicious Generative AI: A New Digital Security Challenge
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of malicious Generative AI, like…
Read More »