Zero Trust and Zero Touch, key differences in company security
Any type of device or user trying to access any corporate resource, even a known one, is potentially dangerous. This assumption is the basis for Zero Trust, a network security…
Do healthcare apps compromise your personal data?
We live in an era where our smartphones can count our steps, monitor our heartbeats, and even schedule doctor appointments. Healthcare apps promise convenience and a better lifestyle, but at…
How artificial intelligence is revolutionizing cyber security
At a time when the technological landscape is constantly evolving and defining our existence, the integration of artificial intelligence (AI) and cyber security is becoming increasingly relevant in innovation. These…
EU to study mobile ecosystems to counter any Apple, Google antitrust pushback
By Foo Yun Chee BRUSSELS (Reuters) – European Union antitrust regulators have commissioned a study into mobile ecosystems to help them counter any pushback from Apple and Alphabet’s Google in…
Top 8 healthcare cybersecurity challenges
The healthcare industry remains a prime target for cybercriminals, and this pattern is anticipated to persist throughout 2023. In the initial quarter of 2023, healthcare organizations disclosed 145 data breaches, as reported…
Cybersecurity for dummies: what it is and why you SHOULD care
Cybersecurity for dummies: As digitalisation takes over the world, effective cybersecurity systems are more important than ever to organisations. You may have heard the term cybersecurity being thrashed about, but…
Strengthening digital resilience: embracing October as Cybersecurity Month
As October rolls around, it is time to spotlight cybersecurity and raise awareness about the critical importance of protecting our digital lives. With cyber threats growing in sophistication and frequency,…
Year 2023 and we still don’t know how to recognize a ransomware
At the centre of recent headlines, ransomware is certainly one of the most talked about cyber threats in Europe as well as around the world. Suffice it to say that,…
‘Power, influence, notoriety’: The Gen-Z hackers who struck MGM, Caesars
By Zeba Siddiqui and Raphael Satter MGM: SAN FRANCISCO/WASHINGTON (Reuters) – About a year ago, the U.S. security firm Palo Alto Networks began to hear from a flurry of companies…
Everything you should know about VPNs
What is a VPN, and how do we use it? Spending time on the internet, many people might have come across the word “VPN” from their favourite YouTubers or website…