The ABCs of White Hat Hacking
The term ‘Devil’s Advocate’ is well-known in the corporate world. It is said to have evolved from the Catholic Church’s procedure of appointing a lawyer specialized in Canon Law from the Office of the Promotor Fidei (Promoter of the faith) to present counterarguments and evidence as to why a candidate being recommended for canonization should […]
Dealing With the Menace of Adware in a Digital World
In the sport of angling, you’d think lures play a very significant part, and rightly so – after all, they entice and snag the fish. They come in a whole lot of shapes, sizes, and colors, each crafted to mimic the look and behavior of a sea creature in water, each intended to interest and […]
Cybersecurity in AI-Driven Healthcare: Navigating New Frontiers
In the Netflix sci-fi film Atlas, Jennifer Lopez playing the role of an analyst with a deep skepticism of Artificial Intelligence (AI) is commissioned to track down the renegade humanoid Harlan, who is intent on creating his own version of a better humanity by destructive means. On the perilous mission that takes her to a […]
Boosting Cybersecurity with Employee Engagement: Analyzing Your Team’s Security Quotient
The Harvard Business Review article (1) that cut swiftly to the chase with its headline ‘Your employees are your best defense against cyberattacks’, couldn’t have said it better. After all, it has long been established that employees in an organization can make or break a cybersecurity program, through their engagement with it. But it is […]
Implementing Responsible AI: Ensuring Ethical and Effective Use of Technology
Almost every other product intended for human consumption comes with a disclaimer or a Statutory Warning. Cigarette packs warn users that smoking can be injurious to health. Packaged foods come with a warning as to their expiry dates, and the use of allergens, preservatives, and ingredients that can pose a health hazard. Even driving mirrors […]
The Hidden Dangers of Pig Butchering Scams
There is an air of despair about him that is almost pitiable, but the despair makes you want to listen to his advice to tread warily when it comes to unsolicited calls and promises of quid pro settlements. Having lost over USD 500,000 including his property which he sold, Barry May (1), a 62-year old […]
The Importance of Employee Reporting in Cybersecurity
The 2017 Uber hack that was discovered thanks to a vigilant employee is still heard in cybersecurity circles whenever the conversation turns to employee vigilance and reporting. In the now-famous hack, a vigilant employee reported that another employee was accessing unauthorized records and stealing sensitive customer data. Uber cybersecurity teams promptly swung into action, but […]
Combating QR Code Scams: An Uphill Battle
When Leonardo da Vinci completed his famed Mona Lisa painting during the Italian Renaissance in the early 1500s, it was almost to be expected that the artist would produce a masterpiece. Yet the painting, now resting in the Louvre Museum in Paris, became over time the object of considerable study that continues till today. The […]
Navigating the Nuances of Log Management in Today’s Digital Landscape
In the world of crime, to name just one of the many walks of life that they facilitate, CCTV cameras play a vital role. In the United Kingdom for example, statistics show that cameras have made a phenomenal contribution to detective and police work, using ‘evidence collected’ to help resolve almost 65% of the cases, […]
Mastering Cybersecurity with Exposure Management Systems
Athletes in the world of endurance sports often spend considerable time training in the outdoors exposed to the sun, which makes them vulnerable to UV rays overexposure, and serious skin cancers. To minimize this danger, they follow a strict schedule and regimen of training in the early hours of the morning when the sun is […]