top of page
Enterprise Security Tech
A cybersecurity resource for CxOs
Search
Jul 26, 2024
Sophisticated Phishing Campaign Exploits Microsoft Office Forms
According to Perception Point, cyber attackers are exploiting Microsoft Office Forms to execute sophisticated two-step phishing...
Jul 26, 2024
Navigating the Financial Fallout: Sam Peters on Deepfake Threats and Business Security
Dive into our conversation with Sam Peters, Chief Product Officer at ISMS.online, as he discusses the financial impacts businesses face...
Jul 25, 2024
Why Data Breaches Are On The Rise Worldwide
This guest post was contributed by Mark Cunningham-Dickie, Principal Incident Response Consultant, Quorum Cyber In 2023, there were 2,365...
Jul 25, 2024
Tricking Potential Insider Threats With Deception Technology
This guest post was contributed by Zachary Amos, Features Editor, ReHack In cybersecurity, insider threats exploit authorized access to...
Jul 25, 2024
Cybersecurity Community Skeptical of USDoD's Alleged CrowdStrike Data Leak
In a recent development within the cybersecurity world, a threat group identified as USDoD has claimed responsibility for acquiring a...
Jul 23, 2024
Cyber Intrusions Using Open-Source Software Foiled By Top Security Company
Arctic Wolf, a leading cybersecurity company, recently thwarted a series of cyber intrusions that utilized an unconventional method to...
bottom of page