From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1
From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1 The first half of the year has been marked by sophisticated attacks, with ransomware incidents reaching alarming new heights and crit...
Top 10 CISO Statistics and Trends in Cybersecurity for 2024
Top 10 CISO Statistics and Trends in Cybersecurity for 2024 The role of the Chief Information Security Officer (CISO) is increasingly challenging. Once viewed as technical experts focused on day-to-da...
Using Artificial Intelligence in Cybersecurity (Ultimate Guide)
Using Artificial Intelligence in Cybersecurity (Ultimate Guide) Welcome to the first of our ultimate guides on cybersecurity topics, starting with artificial intelligence in cybersecurity. In these co...
Vote for SOCRadar: Finalist in the Computing Security Awards 2024
Vote for SOCRadar: Finalist in the Computing Security Awards 2024! We are thrilled to announce that SOCRadar has been selected as a finalist in the 2024 Computing Security Awards! Our innovative solut...
SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Se...
SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS We are thrilled to announce that SOCRadar has been recognized by the Cybersecurity and Infrastructure Se...
The Ransomware Playbook: Evolving Threats and Defense Strategies for 2...
The Ransomware Playbook: Evolving Threats and Defense Strategies for 2024 In 2024, ransomware will continue to rank as one of the most pervasive and effective threats to organizations globally. Attack...
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurt...
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández This interview is part of our ongoing series with industry leaders who share their experiences and strategies in the...
Examples of AI-Assisted Cyber Attacks
Examples of AI-Assisted Cyber Attacks AI-assisted cyberattacks, driven by the rapid advancements in generative AI, have become a significant concern in the cybersecurity landscape. Cybercriminals are ...
IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybe...
IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybersecurity Failures Managing a data breach goes beyond simply addressing the financial impact; it involves tackling a crisis that c...
What is Pretexting? Definition and Examples in Cybersecurity
What is Pretexting? Definition and Examples in Cybersecurity Pretexting is a social engineering tactic in which attackers fabricate a scenario or a “pretext” to trick people into disclosin...
Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Br...
Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Breaches, Misconfigurations, and More) In the fast-changing world of cloud computing, it’s essential for both organizations and prof...
Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training...
Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns The cybersecurity landscape constantly evolves, and staying ahead of emerging threats with complicated risks is more cruc...
The Leidos Leak: What to Know, What Are Its Implications?
The Leidos Leak: What to Know, What Are Its Implications? In July, a post on BreachForums brought to light a significant leak involving Leidos Holdings Inc., claiming the exposure of internal files. L...
Exploit Chain: When One Vulnerability Isn't Enough
Exploit Chain: When One Vulnerability Isn’t Enough A vulnerability is a weakness that cybercriminals can exploit to gain unauthorized access to a computer system. Cybersecurity experts continual...
Threat Intelligence Maturity Model (TIMM) - Utilizing TIP (Threat Inte...
Threat Intelligence Maturity Model (TIMM) – Utilizing TIP (Threat Intelligence Provider) Many organizations lack sufficient knowledge about the threats they face and their own security posture as well...
How Custom GPT Models Facilitate Fraud in the Digital Age
How Custom GPT Models Facilitate Fraud in the Digital Age In recent years, the landscape of Artificial Intelligence (AI) has seen remarkable advancements, with GPT (Generative Pre-trained Transformer)...
Executive Interview: Emerging Trends and Effective Strategies from GCI...
Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin In our ongoing series of CISO interviews, we are excited to share insights from Dan Maslin, the Group Chief Informat...
Top 10 SOAR Platforms
Top 10 SOAR Platforms Security Orchestration, Automation, and Response (SOAR) platforms have become critical tools for improving security operations. These platforms integrate and automate security wo...
Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomw...
Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomware, Phishing, Industry Trends, and More) Welcome to our roundup of the Top 50 Cybersecurity Statistics in 2024. As cyber threats ...
Top 10 Deepfake Scams Impacting Industries Worldwide
Top 10 Deepfake Scams Impacting Industries Worldwide Deepfake technology has emerged as an effective tool for both creative and malicious purposes. This technology employs AI to generate highly realis...