SIM Swap Fraud – what it is and how to avoid it

By imitating your identity, fraudsters can take over your SIM card and access your accounts – before you realize it’s happening.
The post SIM Swap Fraud – what it is and how to avoid it appeared first on NuData Security.
The post SIM Swap Fraud – what… Continue reading SIM Swap Fraud – what it is and how to avoid it

Dr. Igor Mezic, CTO and Chief Scientist at MixMode, Joins Forbes Technology Council

Dr. Igor Mezic, CTO and Chief Scientist at MixMode and world renowned AI researcher, has joined the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs and technology executives.
The post Dr. Igor Mezic, CTO and Chief Sci… Continue reading Dr. Igor Mezic, CTO and Chief Scientist at MixMode, Joins Forbes Technology Council

What are the keys to a successful cybersecurity strategy? Our CEO Ran Shahor Explains All

According to Ran Shahor, CEO and co-founder of HolistiCyber, a successful cybersecurity strategy should start with a detailed plan. This should place your business requirements, budget, and security posture at the forefront of any other decisions you m… Continue reading What are the keys to a successful cybersecurity strategy? Our CEO Ran Shahor Explains All

A Look into Chuck Brooks’s Alarming Cybersecurity Stats

2020 will be remembered most as the year the world was swept up in the COVID pandemic. Dig a little deeper and you’ll find another alarming news story: 2020 was a record breaking year on the Cybersecurity front. There was more data lost in breaches and… Continue reading A Look into Chuck Brooks’s Alarming Cybersecurity Stats

The Importance of Identity and Access Management (IAM) in Cloud Infrastructure

Learn how to easily and securely manage human and service identities, and their entitlements, to secure your organization’s cloud infrastructure.
The post The Importance of Identity and Access Management (IAM) in Cloud Infrastructure appeared first on … Continue reading The Importance of Identity and Access Management (IAM) in Cloud Infrastructure

The Cybersecurity Hero’s Journey is Ours

One of the oldest clichés in security is “security is a journey, not a destination.” It is clear that, when it comes to defending ourselves and the enterprise, we never reach the end. There is always going to be a new challenge. Life is th… Continue reading The Cybersecurity Hero’s Journey is Ours