Insights
Keeping you informed with the latest developments and news in the cyber security and intelligence sectors.
Keeping you informed with the latest developments and news in the cyber security and intelligence sectors.
Many organisations overlook a proactive approach to supply chain management until they experience a data breach or other cyber incident—which can be a very costly mistake.
Ever notice how your favourite social media platform is like a pizza you’ve ordered? By the time its delivered, it’s soggy, cold, and missing half the toppings you’ve asked for.
With the approaching deadline for PCI DSS 4. 0.
I am firmly of the opinion that if Google had fired all their feature developers around 2013 then their 2024 offering would be far superior to the unfortunate guff it has become today.
Tuesday night saw the celebration of a major political event, a commemoration of political stability and continuity: Guy Fawkes Night.
What is a data breach? A data breach occurs when sensitive, protected, or confidential information is accessed, shared, or stolen by an unauthorised person.
In the mid-20th century, Gilbert Ryle threw sand in the eye of Cartesian dualism, calling the idea of a separate mind a 'category mistake' and dubbing it the 'ghost in the machine'—essentially suggesting that Descartes had outed himself as harbouring an imaginary friend.
Everything that I have learned about the US elections this year has been against my will. Don't get me wrong, I am well aware that whoever controls the White House has significant impact around the world, and I will admit that keeping up with American politics makes me a better analyst.
Digital threat intelligence helps us respond to harmful entities and their activities online. As our professional investigation capability evolves, so do the online tactics of threat actors themselves, in something of a perpetual cat and mouse game.
I don’t think many people have escaped the devastating news about the recent hurricanes that have hit the US in recent weeks.
For a long time we’ve worked on the assumption that once something is on the internet, it’s there forever.
I remember when I studied the susceptibility to committing crime in my Crime Studies post-grad. According to research, many factors, ranging from cognitive biases, emotional vulnerabilities, to social environments, influence a person’s likelihood of committing a crime.