How Educational Institutions can Disrupt Ransomware Attackers

Educational institutions face a variety of cybersecurity challenges related to the current extended remote learning reality. Not only do they face diverse attack surfaces to secure, but they often do not have control of the devices connecting to the n… Continue reading How Educational Institutions can Disrupt Ransomware Attackers

The Dangers of Government-Mandated Encryption Backdoors

In late June, two pieces of legislation were introduced to the U.S. Congress, each offering its own requirements for mandating encryption backdoors—which would effectively put an end to end-to-end encryption. The LAED Act, introduced by three Republic… Continue reading The Dangers of Government-Mandated Encryption Backdoors

Deception Technology: Giving Companies Home Field Advantage

Deception technology is no longer considered an overly complex cybersecurity solution designed only for the largest enterprises with infinite financial and operational resources. Deception is being adopted more broadly by companies of all sizes and in… Continue reading Deception Technology: Giving Companies Home Field Advantage

Cyber Risk: A Perfect Storm Approaching Europe?

A perfect storm of cyber threats is bearing down on the European Union in the form of increased infrastructure attacks, sweeping new regulations, and businesses fundamentally unprepared for these changes. Put simply, Europe’s cyber threat landscape is about to change dramatically. The first major trend is the evolution of cyber risk from digital to physical assets. While the loss of personal financial and health records is disturbing, the spectre of cyberattacks against critical infrastructure is the new reality in Europe. The trend began in late 2014 with a crippling cyberattack against a… Continue reading Cyber Risk: A Perfect Storm Approaching Europe?

Posted in SBN