Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Addressing Cyber Risk and the Rise of AI

In this episode of CISO Conversations: EU Data Regulations, Pierre-François Guglielmi, EMEA Field CISO at Rubrik, is joined by Trish McGill, an Executive Subject Matter Expert for Cyber Security IT/OT at De Heus Voeders and Nobian, Brian Wagner, Chief Technology Officer at Revenir, and Tim Clements, Owner of Purpose and Means. Together, they explore the impact of cyber-attacks and data regulations on business resilience, particularly concerning critical infrastructure, and how these factors ultimately affect profits.

Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide

The healthcare industry remains a prime target for cyberattacks, with the growing adoption of digital health technologies escalating the risk. Hospitals and clinics, custodians of vast amounts of sensitive patient data, are particularly vulnerable. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient privacy and maintaining operational integrity.

Security Awareness Isn't Enough - It's Time to Adapt

October 1st marks the start of Security Awareness Month. A global campaign launched two decades ago to improve cyber security awareness and equip people with the knowledge and resources they need to be secure online. But what impact has this campaign truly had in the workplace? Yes, it spotlights the issue and boosts high-level awareness of threats like phishing.

How to Optimise Your GRC Tools: Improving Value, Efficiency & True Risk Management

In this episode of Razorwire, we're joined by Jack Jones, creator of the FAIR risk model, to explore the complexities of Governance, Risk and Compliance (GRC) tools. We cut through the noise to deliver actionable insights on how to truly manage risk and improve the value and efficiency of your GRC solutions.

Complete Third-Party Risk Management Guide for 2025

Third-party risk management (TPRM) is the structured process of identifying, assessing, and mitigating risks posed by external vendors, suppliers, and service providers. These risks can include cyber threats, data breaches, regulatory violations, and financial instability, all of which can severely impact your organization’s security and compliance posture.

Exfiltration over Telegram Bots: Skidding Infostealer Logs

In recent years, Telegram has emerged as a popular messaging platform among cybercriminals, driven by its combination of simplicity, security, and efficiency. Telegram's encrypted messaging capabilities, real-time communication, and the ability to send large data files make it an ideal platform for cybercriminal activities, making it an attractive alternative to traditional underground forums.

How to Conduct a Cybersecurity Risk Assessment for In-Depth Insights

‍A cybersecurity risk assessment, or cyber risk assessment, is a standardized process that organizations have established along with their implementation of cloud-based technologies to discover the accompanying vulnerabilities and threats. These assessments leverage the available, relevant data to identify the likelihood of various cybersecurity events occurring along with the potential impact should they come to fruition.

AfterDarkMode Malware: What It Is and How to Mitigate the Risk

Now that AfterDarkMode malware is out there, internet threats are even more complicated and dangerous. That person who is sneaky and hard to catch has shown that they are motivated to get into systems and use weaknesses to their advantage. For businesses to be safe from the AfterDarkMode threat, they need to understand its plans, methods, and procedures and take steps to lower the risk. AfterDarkMode malware is a very advanced and sneaky threat that can take over computers without anyone noticing.