With the increasing reliance on complex supply chains that span across various vendors and service providers, these supply chain cyber threats have become a genuine concern in the cybersecurity space and require a more proactive approach to mitigate these risks. …Continue Reading: How to Identify and Prevent Supply Chain Attacks?
The year started like 2020 did not end. Living in lockdown has proven to be fairly difficult for all of us and the cybercriminals are out there making it even worse. They are busy taking advantage of organizations trying to configure their journey to digital transformation, cloud adoption and remote working. By combining the fast…Continue Reading: Brand protection and BEC attacks of 2021
Ultimately criminals don’t want to waste time on targets that won’t be susceptible to their scams, so they use social engineering techniques to filter out the wary from the credulous. They don’t want to waste time on targets that have clearly invested money and effort in constructing effective cyber defences, so they focus on identifying those whose security ‘posture’ appears weakest (think of a burglar walking down the street looking for a property with an open window). …Continue Reading: Broken Windows in Cybersecurity strategy