FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat Europe 2025: Was that device designed to be on the internet at all?

โ€” December 12th 2025 at 15:22
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat Europe 2025: Reputation matters โ€“ even in the ransomware economy

โ€” December 11th 2025 at 16:04
Being seen as reliable is good for โ€˜businessโ€™ and ransomware groups care about 'brand reputation' just as much as their victims
โ˜ โ˜† โœ‡ WeLiveSecurity

Locks, SOCs and a cat in a box: What Schrรถdinger can teach us about cybersecurity

โ€” December 11th 2025 at 10:00
If you donโ€™t look inside your environment, you canโ€™t know its true state โ€“ and attackers count on that
โ˜ โ˜† โœ‡ WeLiveSecurity

Seeking symmetry during ATT&CKยฎ season: How to harness todayโ€™s diverse analyst and tester landscape to paint a security masterpiece

โ€” December 10th 2025 at 15:03
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
โ˜ โ˜† โœ‡ WeLiveSecurity

The big catch: How whaling attacks target top executives

โ€” December 9th 2025 at 10:00
Is your organizationโ€™s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
โ˜ โ˜† โœ‡ WeLiveSecurity

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

โ€” December 4th 2025 at 10:00
Identity is effectively the new network boundary. It must be protected at all costs.
โ˜ โ˜† โœ‡ WeLiveSecurity

MDR is the answer โ€“ now, whatโ€™s the question?

โ€” November 24th 2025 at 10:00
Why your business needs the best-of-breed combination of technology and human expertise
โ˜ โ˜† โœ‡ WeLiveSecurity

Why shadow AI could be your biggest security blind spot

โ€” November 11th 2025 at 10:00
From unintentional data leakage to buggy code, hereโ€™s why you should care about unsanctioned AI use in your company
โ˜ โ˜† โœ‡ WeLiveSecurity

Ground zero: 5 things to do after discovering a cyberattack

โ€” November 3rd 2025 at 10:00
When every minute counts, preparation and precision can mean the difference between disruption and disaster
โ˜ โ˜† โœ‡ WeLiveSecurity

Recruitment red flags: Can you spot a spy posing as a job seeker?

โ€” October 28th 2025 at 10:00
Hereโ€™s what to know about a recent spin on an insider threat โ€“ fake North Korean IT workers infiltrating western firms
โ˜ โ˜† โœ‡ WeLiveSecurity

How MDR can give MSPs the edge in a competitive market

โ€” October 27th 2025 at 10:00
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
โ˜ โ˜† โœ‡ WeLiveSecurity

IT service desks: The security blind spot that may put your business at risk

โ€” October 15th 2025 at 09:00
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Hereโ€™s how your team can close a growing security gap.
โ˜ โ˜† โœ‡ WeLiveSecurity

The case for cybersecurity: Why successful businesses are built on protection

โ€” October 7th 2025 at 09:00
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
โ˜ โ˜† โœ‡ WeLiveSecurity

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

โ€” October 3rd 2025 at 09:00
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
โ˜ โ˜† โœ‡ WeLiveSecurity

Small businesses, big targets: Protecting your business against ransomware

โ€” September 18th 2025 at 09:00
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
โ˜ โ˜† โœ‡ WeLiveSecurity

Are cybercriminals hacking your systems โ€“ or just logging in?

โ€” September 11th 2025 at 08:55
As bad actors often simply waltz through companiesโ€™ digital front doors with a key, hereโ€™s how to keep your own door locked tight
โ˜ โ˜† โœ‡ WeLiveSecurity

Preventing business disruption and building cyber-resilience with MDR

โ€” September 9th 2025 at 09:00
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
โ˜ โ˜† โœ‡ WeLiveSecurity

Under lock and key: Safeguarding business data with encryption

โ€” September 5th 2025 at 08:53
As the attack surface expands and the threat landscape grows more complex, itโ€™s time to consider whether your data protection strategy is fit for purpose
โ˜ โ˜† โœ‡ WeLiveSecurity

The need for speed: Why organizations are turning to rapid, trustworthy MDR

โ€” August 19th 2025 at 09:00
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
โ˜ โ˜† โœ‡ WeLiveSecurity

Supply-chain dependencies: Check your resilience blind spot

โ€” August 12th 2025 at 14:08
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurerโ€™s?

โ€” August 8th 2025 at 14:25
A sky-high premium may not always reflect your companyโ€™s security posture
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

โ€” August 7th 2025 at 16:03
Whoโ€™s to blame when the AI tool managing a companyโ€™s compliance status gets it wrong?
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

โ€” August 7th 2025 at 14:23
Success in cybersecurity is when nothing happens, plus other standout themes from two of the eventโ€™s keynotes
โ˜ โ˜† โœ‡ WeLiveSecurity

How government cyber cuts will affect you and your business

โ€” July 3rd 2025 at 09:00
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
โ˜ โ˜† โœ‡ WeLiveSecurity

Attacks on the education sector are surging: How can cyber-defenders respond?

โ€” April 14th 2025 at 09:00
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
โ˜ โ˜† โœ‡ WeLiveSecurity

Resilience in the face of ransomware: A key to business survival

โ€” March 31st 2025 at 09:00
Your companyโ€™s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage
โ˜ โ˜† โœ‡ WeLiveSecurity

Making it stick: How to get the most out of cybersecurity training

โ€” March 28th 2025 at 10:00
Security awareness training doesnโ€™t have to be a snoozefest โ€“ games and stories can help instill โ€˜stickyโ€™ habits that will kick in when a danger is near
โ˜ โ˜† โœ‡ WeLiveSecurity

AI-driven deception: A new face of corporate fraud

โ€” March 10th 2025 at 10:00
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses
โ˜ โ˜† โœ‡ WeLiveSecurity

Patch or perish: How organizations can master vulnerability management

โ€” February 5th 2025 at 10:00
Donโ€™t wait for a costly breach to provide a painful reminder of the importance of timely software patching
โ˜ โ˜† โœ‡ WeLiveSecurity

Untrustworthy AI: How to deal with data poisoning

โ€” January 30th 2025 at 10:00
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output โ€“ even dangerously so
โ˜ โ˜† โœ‡ WeLiveSecurity

The evolving landscape of data privacy: Key trends to shape 2025

โ€” January 23rd 2025 at 10:00
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
โ˜ โ˜† โœ‡ WeLiveSecurity

Under lock and key: Protecting corporate data from cyberthreats in 2025

โ€” January 21st 2025 at 10:00
Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage
โ˜ โ˜† โœ‡ WeLiveSecurity

State-aligned actors are increasingly deploying ransomware โ€“ and thatโ€™s bad news for everyone

โ€” January 7th 2025 at 10:00
The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of todayโ€™s cyberthreats
โ˜ โ˜† โœ‡ WeLiveSecurity

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

โ€” December 18th 2024 at 10:00
While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack โ€“ make sure your company's defenses are ready, no matter the time of year
โ˜ โ˜† โœ‡ WeLiveSecurity

Achieving cybersecurity compliance in 5 steps

โ€” December 3rd 2024 at 10:00
Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements
โŒ