Cybersecurity

Discussing Cybersecurity Best Practices in the New Year

2019 is just over a week old; we at The Threat Report take this occasion to discuss cybersecurity best practices, stressing on important aspects including importance, training et al. Let’s begin with a proper introduction. Well, as part of the introduction, we’d like to point out that for any business today, especially those that depend

[ Read More ]

Cybersecurity Tips for Protecting Organizations in 2019

The world of cybercrime is changing fast; it’s ever-evolving. As we step into the new year, we need to discuss things that need to be done, to ensure better cybersecurity, for individuals, for organizations and businesses. In this piece, we discuss some basic tips that could help organizations protect themselves against cyberattacks in 2019. Here

[ Read More ]

How To Minimize The Chance Of Becoming The Next Victim of Cyber Attacks?

The world has breached the very limit of the Internet Protocol version 4 address, AKA IPv4. This addressing scheme enables around 4.3 billion distinct devices to be connected to the Internet at the same time. However, as mentioned by the father of the Internet, Vint Cerf, IPv4 was not designed as a ‘production’ protocol but

[ Read More ]

Idaho National Laboratory: A Covert Anti-Cybercrime Lab

The United States as a nation knows how to maximize its resources, that is one of the main advantages she has compared to other industrialized nations. The ‘double duty’ of a government agency or installation is usually done covertly in order not to attract attention, both internal and external. As cybersecurity defense needs grew not

[ Read More ]

Iranian Government Accused of Phishing-Based Cyber Espionage

State-sponsors hackers have been in the news for quite a while. With former NSA contractor, Edward Snowden exposed NSA’s Prism operation in 2012, basically a global espionage. The Lazarus group allegedly connected with North Korean regime, accused of being responsible for the Sony Pictures of America data breach of 2014 and WannaCry ransomware attacks of

[ Read More ]

Saipem after the Unauthorized Remote Access Incident

Saipem, the contractor of two big oil refineries, Duqm (based in UAE) and Saudi Aramco (headquartered in Saudi Arabia) has publicly announced that it was a victim of a cyber attack last December 10, 2018. Unauthorized users were able to penetrate the servers, but fortunately, failed to get a hold of the data stored on

[ Read More ]

Is Zero-Trust Security Actually A Game Changer?

The big buzzword in the industry today is “zero-trust security.” It’s getting a lot of ink—but is it real? Is it practical? And for starters, what the heck is it, exactly? How Enterprises Protect Their Digital Stuff in an Evolving World Long ago, back in far simpler days, enterprises protected their networks by surrounding them

[ Read More ]

Protecting The Best Machine Of All: The Human Brain

With each passing day, mental health in the workplace is being talked about more freely, more honestly, and with way less stigma than ever before. People know that shortages in staffing often mean employees are overworked and underappreciated, a primary cause for stress, anxiety, and depression. And no sector is more likely to run short

[ Read More ]

How To Keep Employees Alert Through A Phishing Simulation

As a business owner, you can teach employees all day long with tech guides or links to YouTube videos, but nothing educates an individual quite like submerging them in the reality of a dangerous situation. That’s the aim of a phishing simulation, to expose employees to a realistic scenario where they can learn from their

[ Read More ]

Fake Fingerprints Prove To Be A Biometric Security Risk

The one thing we thought was more unique than a snowflake—our fingerprints—can now be hacked. Straight out of a science fiction movie, you can’t make this stuff up. The advent of biometric technology, which is the technical term for body measurements and calculations, has made fingerprint and facial recognition the method of the moment for

[ Read More ]