Tag

cyber security
// this is the search and dropdown stuff //
Scrabble Tiles

How Secure Are Your Passwords?

AI powered password cracking tools are making short work of weak passwords.
concept image of open source xz utils vulnerability

How Safe Is Open Source? Lessons Learned from the XZ Utils Vulnerability

On March 29, a Microsoft Security researcher identified a piece of malicious code that was embedded in a tiny little...
concept of identified risk during assessment | How to Identify and Address Lurking Cyber Risks in Fintech

How to Identify and Address Lurking Cyber Risks in Fintech

In the cybersecurity world, fintech is widely known as a major target for threat actors. Vulnerabilities within fintech organizations can...
stop sign that says “Ransomware” | Top Ransomware Defense Strategies for Fintech Companies

Top Ransomware Defense Strategies for Fintech Companies

Ransomware is on the rise in the financial sector as a whole. A report by Sophos from 2023 indicates that...
stack of old tube TVs representing an infosec tech stack holding you back

Is Your Infosec Tech Stack Holding You Back?

Infosec tech stacks have a long and complex history that dates back to the days of mainframe and COBOL programming....
CISO in fintech talking on the phone outside

The Evolving Role of the Fintech CISO

Fintech CISOs are facing rapid change in their sector’s technological innovations and regulations. As a result, CISOs must be the...
Fintech cybersecurity program, represented by a business person with tablet and fintech illustration

Is Your Fintech Cybersecurity Program on Track? Here’s How to Prioritize Your Needs

While your fintech org may be able to check boxes on their cybersecurity program, that doesn’t necessarily mean you’re safe...
closeup of professionals at a laptop | hiring a cybersecurity firm

What to Look for When Hiring a Cybersecurity Firm

When hiring a cybersecurity firm, you need to find the right solution for your needs. Follow these best practices and...
businessman with crossed fingers behind his back | What to Do if You Suspect Insider Threat

What to Do if You Suspect Insider Threat

Insider threats are one of the most devastating types of security breaches. It’s important that every security professional knows how...
1 2 3 4 5