Articles. Subjects. Topics. Videos.
This is the place where you can find relevant Cybersecurity News and Video Materials from our Speakers from past conferences.
"ATTACK ON HOLM CITY "
WAS PART OF 2023 CONFERENCE
Read More
Unlock the power of the cloud with control and visibility. Learn why maintaining control and visibility in the cloud is crucial for secure operations.
Guard against risks! Explore strategies to shield against threats posed by infiltrating trusted vendors. Enhance TPRM for robust cybersecurity.
Unlock cybersecurity prowess with automatic vulnerability identification. Learn how automation fortifies defenses in the ever-evolving digital landscape.
Explore the future of cybersecurity as AI takes the lead, revolutionizing threat intelligence and shaping the AI role in threat intelligence.
Enhance your cybersecurity arsenal with AI-powered security solutions for real-time threat detection and response. Stay ahead of evolving digital threats.
Discover how evolving Cybersecurity Regulatory Frameworks in 2024 adapt to industry specifics, ensuring robust digital protection.
Safeguard smart homes, connected cars, and industrial systems from devastating IoT attacks with proactive cybersecurity measures.
Explore defenses against the expanding attack surface in 5G networks. Learn to thwart threats in the evolving landscape of the Attack on 5G.
Explore the intricate landscape of cryptocurrency users attacks, from smart contract vulnerabilities to flaws in wallet software and social engineering threats.
Discover the transformative power of AI in cybersecurity, enhancing threat detection and response capabilities for resilient digital defense.
Explore the transformative potential of IoT, Cloud AI, and Blockchain amid the challenges of IoT vulnerabilities. Uncover insights for robust cybersecurity.
Guard your digital wallet: Exploring defenses against Payment Apps Attacks. Stay secure amidst the evolving landscape of Payment Apps Attacks!
Unveiling the vulnerabilities: Addressing Weaknesses in Outdated Software and Misconfigured Systems. Bolster security against weaknesses in outdated software!
Dive into the digital battle: Navigating the Increasing Sophistication of Attacks. Stay ahead in understanding the sophistication of attacks!
Explore the cybersecurity landscape: Unmasking the top 10 Ransomware Gangs and their tactics. Stay informed about top 10 Ransomware Gangs!
Unlock insights into the booming Endpoint Security Segment, fueled by the rising Bring Your Own Device trend. Embrace BYOD securely!
Shield your digital realm! Learn to Defend Against MFA Bombing, EDR Evading, and SEO Poisoning. Safeguard with expertise against MFA bombing threats.
Discover the evolving landscape! Explore how Application Security is set to grow, fortifying digital defenses in the ever-changing cyber realm.
Unraveling the ominous evolution of ransomware, explore the depths of triple extortion tactics. Safeguard your digital assets with insights on triple extortion.
Dive into the world of IoT standardisation, where challenges meet triumphs in creating a secure, interconnected Internet of Things devices standardisation landscape.
Explore strategies to fortify against supply chain potential vulnerabilities. Safeguard your digital assets from malicious code in legitimate software packages.
Unveil the vulnerabilities: Mobile devices as cyber criminals targets. Learn how to secure your digital life in a world of evolving threats.
Uncover the catalysts propelling CISOs to change roles rapidly in the “Why CISOs Change Jobs” shake-up. Explore the dynamics of cybersecurity leadership.
Explore the transformative power of resilience in business, navigating the intricate landscape shaped by the impact of cybersecurity incidents.
Learn to tackle vulnerabilities in cloud infrastructure caused by misconfigurations and inadequate access controls. Enhance your cloud security strategy today.
Uncover the growing challenge of Shadow IT – By 2027, 75% of employees will adopt tech beyond IT’s view. Stay informed about Shadow IT trends.
Explore the deceptive world of deepfakes. Learn how AI crafts fake AI videos and audios, and discover defences against this emerging threat.
Discover how to combat insider cybersecurity threats. In a world of unknowns, security is your delight. Learn more now!
Addressing the cybersecurity experts lacking issue: Strategies to bridge the skills gap through reskilling and upskilling. Learn more
Unlocking NIS2: Learn how to navigate and thrive in the era of heightened cybersecurity compliance. Get ready for NIS2 with our insights.
Discover how to enhance security while going under the radar with MFA. Learn about integration, education, and avoiding security gaps.
Discover insights from cybersecurity expert Mikko Hypponen speaking in Stockholm. Explore the world of digital security with a leading authority.
Elevate cybersecurity awareness for the boards: Learn to speak their language and align strategies effectively.
Unveil the pivotal role of human firewalls in cybersecurity. Technology alone can’t secure your digital assets.
Navigate the evolving Mobile Threat landscape in 2024. Stay informed about emerging risks and protect your mobile devices.
Discover the evolving landscape of cloud security threats in 2024 and how to fortify your defences. Stay ahead in the cloud era.
Defend against the rise of phishing attacks with Multi-Factor Authentication (MFA). Learn how in ‘Phishing In Your Own Pond!’
Explore the paradigm shift in cybersecurity with the Zero Trust mindset. Learn to ‘never trust, always verify’ for robust protection.
Explore the dual nature of AI in the world of cybersecurity. Is it a blessing or a curse?
Explore the persistent Ransomware Threat and how to defend against it in our latest blog.
Explore the world of Cyber Risk Quantification in our latest blog. Get insights on effective CRQ models
Explore the dynamic cyber security trends 2023, from AI to nation-state threats. Stay ahead in the ever-evolving digital landscape.
For a moment, we felt a sense of security, when we implemented Multi-Factor Authentication (MFA) for our critical users, Yet, another form of attack has emerged, known as MFA bombing.
Enhance security with Identity and Access Management (IAM). Explore strategies, trends, and best practices in modern cybersecurity.
Enhance your security with Multi-Factor Authentication (MFA). Discover its benefits, trends, and future potential in our blog post.
Impact of data breach by human error. Learn how unintentional mistakes can lead to security vulnerabilities and sensitive data exposure.
Explore the realm of automotive hacking and its implications. Stay informed about the risks and safeguards in modern vehicles.
Explore the transformative potential of IoT 5G Network. Uncover the tech marvels and risks in this new era of connectivity.
Discover best practices for managing and recovering from a data breach. Learn how to respond to security incidents effectively.
Discover essential backup and recovery best practices for data protection. Safeguard your valuable information with effective backup and recovery strategies.
Discover best practices for ensuring the security of your data during migration. Explore the importance of data migration and critical considerations.
Protect your VOIP communication with these essential best practices. Learn how to ensure VOIP security in our latest blog post.
Protect your mobile devices with these best practices. Learn how to enhance mobile device security and keep your data safe.
Protect your organisation from email attacks in the hybrid work era. Learn how to defend against email attacks and secure your digital communication.
Discover the transformative role of AI in DevSecOps. Enhance security, automate processes, and mitigate risks.
Discover the increasing significance of API security in today’s cybersecurity landscape. Learn key strategies and practices to safeguard your APIs.
Learn how to recognize and prevent social engineering attacks. Enhance your security awareness to protect yourself from manipulation and scams.
Discover the evolution of phishing attacks, from clone websites to credential harvesting, and learn effective countermeasures.
Discover how threat intelligence strengthens cybersecurity defense. Learn about its role in proactive threat detection and incident response.
Discover practical strategies to prevent and respond to the rising threat of ransomware attacks. Safeguard your organisation’s data and operations.
Discover the challenges and solutions in securing the Internet of Things. Explore strategies to safeguard IoT devices and networks.
Discover the AI security implications with insights on phishing email creation, AI threat intelligence lookup, and more.
Discover the power of passwordless authentication in strengthening security. Learn how to adopt this modern approach for robust protection.
Discover practical strategies and measures to enhance cybersecurity hygiene and posture management for robust protection.
Modern cloud native technologies enable you to build, deploy, and scale rapidly. But this increased complexity exposes your application to new risks and vulnerabilities. Each layer of your cloud native application – spanning your code, third party dependencies, containers, and clusters – exposes you to new security concerns. Learn how you can protect your application through clear remediation actions and best practices, and how Developers are key in the transition to DevSecOps.
Learn how DDoS attacks work, attacker motivations, and best defence practices to protect your organisation in the DDoS cyber criminal ecosystem.
• With the massive migration to cloud infrastructure and many new cloud-native companies, management of human and service identities and entitlements has become an extremely significant factor in the security posture of cloud infrastructure.
• The dynamic nature of cloud development and operations leads to inadequate management of the identities and access privileges that hold the key to applications and data. On the other hand, they give security professionals a level of control that was previously unimaginable.
• During this session we will explore the opportunities and risks, and review the recently published IDSA CIEM (Cloud Infrastructure Entitlements Management) best practices for managing identities in your cloud environment to limit the attack surface and help reduce blast radius in case of a breach.
Adapt your security mindset for the cloud. Learn about crucial cloud security strategies for CISOs.
How does Europe's prominent food delivery platform maintain cloud efficiency and Security as it grows its network of customers, merchants, and couriers? Learn in this session Key Takeaways:
• How to assess and report on your maturity joUnderstand the impact of growth on your cloud security program
• How to crawl, walk, and run in a modern cloud security program
Discover how to detect cyber threats using global attack data. Improve your cybersecurity defence with advanced threat detection.
Learn how to secure cloud identities and entitlements at scale with CIEM. Understand the risks of unsecured cloud identities and best practices.
Cyber Threats show no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all bolstering the Attack Chain, creating new planes of privileges for attackers to exploit In this session you will learn how you can break the attack chain and establish a solid foundation for security project success, including:
• Common attack chain entry points
• Practical steps you can take to block entry
• How PAM ensures project success
Protect your organisation from Cyber Risk – learn about the latest threats and regulatory requirements.
Cybersecurity makes headlines more frequently in the past years. How are our daily lives affected by cybersecurity incidents? Which are the industries which need to be concerned the most and which are their challenges?
• Does the evolving threat landscape affect the infrastructure architecture?
• Which are the key industries that need to be in the spotlight?
• What is the perception of society when it comes to cybersecurity?
Discover best practices and steps for a converged Internal and External Cyber Defense strategy from a CISO perspective.
Learn how cybercriminals use criminal proxy services to evade detection and how to detect and stay ahead of them. A deep dive into Criminal Proxy Services.
Zero trust is more than the latest tech marketing buzzword; it’s a practical approach to securing container environments. This model emerged as the application/service perimeter began to disappear as we evolved from physical devices to VMs, microservices and finally, distributed workloads in the cloud and at the edge. This evolution has forced improvements in the security model – from a reactive model that uses deny lists and firewalls to protect the known perimeter to proactive, zero trust models. With zero trust, we’re minimising the attack surface by using an “allow” list that blocks unapproved network connections and processes, so that teams can stop attacks before they start and stop zero-day threats by their suspicious behaviour activities.
Learn about the macOS attack chain, clients’ roles in a cloud-based digital world, and tools hackers use to compromise organisations.
Even the best firewalls, filters, backups, and VPNs can't prevent a cyber attack. In addition to well-developed technology and infrastructure, the awareness of all employees is very important. We claim that we need more than just awareness but a cybersecurity culture in order to really change behaviour of all stakeholders. First of all, cybersecurity culture needs an assessment of organisational, technical and human competences. In order to form a cybersecurity culture, various awareness campaigns go hand in hand with capacity and competence building, i.e. cybersecurity training as well as anchoring it in all management and business processes. We will present how this journey can and should be planned, which steps to take first and best practices in establishing a cybersecurity culture.
Protect your organisation from cyber attacks by breaking the attack chain. Learn how PAM can help ensure project success.
Learn how Network Detection and Response (NDR) can help enable a Zero Trust Architecture in this informative blog post.
Learn how to recover quickly after a cyberattack and keep your business afloat with our expert tips for returning from a security breach.
Discover the story of Brett Johnson, once dubbed the “Original Internet Godfather,” who went from a notorious cybercriminal to a respected security consultant.
Discover how the Department of Defense implemented a DevSecOps stack with Kubernetes and Istio. Learn about their move to zero trust and data-centricity.
Secure the cloud with continuous visibility and end-to-end protection. Learn how to shine a light on true risks and act on real threats for cloud confidence.
Learn about the importance of Privileged Access Management (PAM) in governing your most sensitive IT accesses and securing your organisation’s data.
Learn how modern security awareness works to prevent phishing and social engineering attacks. Discover the role of psychological behaviour patterns and gamification for a successful defence.
Discover the latest cyber threats as pro-Russian attackers target Dutch hospitals and Finland brings its cyber capabilities to NATO. Is anyone safe anymore?
This blog post explores the havoc caused by stealer malware, specifically Redline and Racoon, and provides insights on how to prevent and mitigate the risks of this threat.
Learn how to reduce cloud risk and prevent future attacks on your cloud estate. Discover strategies to harden your cloud security and avoid blind spots proactively.
Protect and recover your Active Directory with these tips! Learn about the most common AD security risks and prepare for the 2023 cybersecurity landscape.
Ready to Defend: Learn about the evolution of cybersecurity tools, the Gartner SOC Visibility Triad, and real-life use cases for effective cybersecurity defence.
Let’s talk about how the massive hack happened and why it’s such a big deal?
• What are the best practices to manage an incident?
• What are the best responses and lessons learned?
• Find out what are the greatest challenges that security professionals are facing
• How can we improve defenses and why knowledge is the best defense?
Discover how to build cyber resiliency for your MSP business in 2023. Learn how cyber resiliency can drive growth while protecting your business.
Hacker groups target Denmark and Sweden, while Russia poses a growing security threat, says Swedish Security Services. Learn more.
Learn about Brett Johnson, former US Most Wanted cybercriminal, and his unique approach to cybersecurity. Gain insights on how to protect yourself online.
Recently, the Russian group “Anonymous Sudan” launched a new series of DDoS attacks on websites belonging to both the public and private sectors.
Learn about the two greatest risks – third-party and cybersecurity risk. Stay ahead of the curve with our expert insights and advice.
Discover the latest zero-day findings and mitigation strategies for third-party cyber risk in this comprehensive blog. Stay ahead of threats.
Stay ahead of cybersecurity threats by working at the speed of security. Read our latest blog to learn how to keep your organization secure.
Putting your company online might be advantageous, but it also raises the possibility of security attacks. To help shield your company from cyber dangers, follow our recommendations.
Cybersecurity awareness and how to bridge the gap between the IT department and the organisation!
With e-waste continuing to be an issue worldwide, and global data protection requirements increasing rapidly, how can you achieve Circular IT-management and full compliance? Join this panel to hear the discussion around how to avoid data breaches while changing to green asset decommissioning methods that can support your enterprise in meeting its ESG goals.
The panellists will tackle the following topics:
• Circular IT models and how to reduce pre-carbon footprint waste
• Best practice data disposal methods and how to avoid common pitfalls
• What can be done to shift the trend, while upholding the most stringent data security regulations
Scammers are busier than ever with remote work in full swing. So let’s talk about some security awareness training’ do’s and don’ts.
Cybersecurity is more critical today than ever, with virtual threats surging to historic highs. What about its societal aspects?
When the worst happens not even the best incident response plans can account for the human element. You might know how your tech will work under pressure but what about you and your people? In this interactive session, you’ll use your decision-making skills to find the threat and manage the growing crisis. See the real-time impact of the human element in crisis management and response Gain a greater understanding of how decisions in a threat scenario have a business-wide impact Discover how to strengthen your organization on both sides of “the boom”, so it’s as ready before the impact as it is after it
Cyber threats can appear in any unique way in the business environment. A geo-targeted phishing attack is a notable illustration of this.
Cloud network security is a fundamental element of cloud security. An organisation’s on-premises environment must have the same level of security as its cloud-based infrastructure.
Threat detection has gotten harder since attackers always develop new ways to access sensitive data. How can cybersecurity management be developed to reduce risk? Read more.
Smart cities will undoubtedly experience increased exploits until authorities give cybersecurity the priority it deserves. Hackers have demonstrated a propensity to take advantage of any vulnerability.
According to cyber security researchers’ findings about the anatomy of ransomware, it takes only a period of two weeks to gain access for cyber criminals to a network and deploy ransomware.
The most important factor is to monitor the network to make sure not to do too much or too less and to keep track. Organizations often struggle to monitor hence it allows hackers to go under the radar and cause trouble.
In order to protect against the evolving threat landscape, we must change the way in which we protect our data against vulnerabilities. To adapt, organizations are operating within the framework that no user, network, or device can be trusted by default until proven otherwise.
According to security researchers, Uber Eats’s user records have been discovered on DarkWeb.
New campaigns are made for Office 365 users who are returning to the workplace with Coronavirus training resources according to the experts.
When it comes to employee privacy in Android 11, Google has expanded Android's commitment by bringing privacy protections for company-owned devices.
From ransomware to cyber warfare, from the Internet of Things to artificial intelligence, and from driverless to autonomous, we are seeing a seismic shift in the digital and the threat landscape, cyber-attacks, and overall risks.
• What are the top global and existential cyber threats & risks to your business?
• What is your true risk exposure and its impact on your business and society?
• How to build a sustainable defense for that next cyberattack lurking around the corner?
• How to better posture your organization in the age of convergence, uncertainty, and staggering opportunities?
Ghost Squad Hackers (GSH) have defaced a site of the European Space Agency (ESA) for the second time. A group of hacktivists is going online with the name of GSH and performing these attacks.
The cybersecurity department of organizations is struggling with visibility when it comes to key security controls.
It was observed in late June this year that the malware EvilQuest (also known as ThiefQuest), has been evolving pretty fast. It has become more sinister than earlier even after the ransomware (not anymore) has removed its file encryption capabilities.
According to the Computer emergency response team (India), more than 300 apps such as email, e-commerce apps, and social media apps, besides banking and financial apps credentials and credit card information can be extracted.