In the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreA growing number of cyberattacks against healthcare organisations are having a serious impact on patient care. And that means that improvements in healthcare security are likely to pick up pace.
Read MoreOur top-performing blog posts of 2023 are here! From cyber resilience challenges to the rise of for-profit hacking, these articles are packed with valuable insights.
Read MoreA surge in cyber attacks against the US healthcare sector is driving renewed government attention on this critical industry.
Read MoreResearch shows that the maritime industry is at high risk of cyber attacks, and new solutions to protect ships and offshore operations are needed.
Read MoreResearchers at WatchGuard predict a rise in vishing (voice phishing) in 2024 due to advancements in generative AI tools, making deepfake voices highly convincing. Deepfake audio combined with automation allows for mass-scale vishing attacks, eliminating the need for human interaction.
Read MoreWhat could happen when private genetic testing companies become targets of cyber attacks?
Read More