Game Plans and Playbooks: Building and Implementing a Cybersecurity Strategy

In this insightful podcast episode, Christina Morillo, Head of Information Security at the NFL’s New York Giants, reveals the secrets to crafting a robust cybersecurity strategy. The discussion delves into the importance of curiosity over rigid plans, addressing common misconceptions in cybersecurity, and the crucial step of moving from strategy to implementation. Christina shares valuable […]

Read More →

Three-minute explainer on… slopsquatting

Slopsquatting is a new theoretical cyber attack that exploits a flaw in generative AI systems—their tendency to hallucinate or create information that doesn’t actually exist. This poses potential security threats for developers and software engineers who trust AI-generated code. Source: Raconteur Key Points Slopsquatting leverages generative AI’s propensity to “hallucinate” code that isn’t real. Cyber […]

Read More →

4 Primary Security Risks to Mitigate in GenAI Solutions

As artificial intelligence becomes increasingly prevalent in government agencies, understanding and addressing security risks is vital for safety and compliance. This article delineates four primary risks associated with generative AI, providing insights on measures to mitigate them effectively. Source: FedTech Magazine Key Points Defence officials must focus on mitigating AI hallucinations, where AI presents factually […]

Read More →

TG&H Hosted Webinar — Ransomware: Are You on a Hacker’s Hit List?

In a recent webinar hosted by TG&H, cybersecurity experts Trisha Wilbrand and Jennifer Moreno from REDW tackled the ever-pressing threat of ransomware, particularly focusing on how Tribal organisations can bolster their defences. The session is packed with valuable insights and strategies vital for safeguarding against cyber threats. Source: Tribal Gaming and Hospitality Magazine Key Points […]

Read More →

What Is the Best Authenticator App to Use?

Summary As cybercrime costs skyrocket, implementing multifactor authentication (MFA) is becoming increasingly essential for businesses. Authenticator apps play a crucial role in enhancing account security by generating one-time passcodes, acting as a formidable barrier against unauthorised access. This article dives into six top-rated authenticator apps, outlining their features, benefits, and suitability for various business needs. […]

Read More →

Debunking Myths About Data Breach Disclosures in Higher Ed

The article discusses common misconceptions surrounding data breach disclosures in higher education institutions. Karen Scarfone, a cybersecurity consultant, highlights the importance of understanding these myths to effectively manage data breaches and ensure compliance with relevant laws. Key Points FERPA does not mandate data breach notifications; it only requires documentation of student record exposure. Universities must […]

Read More →

Responding to a Cyber Attack – Key Considerations for GCs and CISOs

As companies pivot from worrying about “if” they’ll face a cyber attack to “when,” it becomes clear that preparation and strategic planning are critical for navigating risks related to regulatory actions, reputational damage, and potential litigation. This article from Skadden’s experts delves deep into what financial services firms need to consider when a cyber attack […]

Read More →

Banks Rethink Cybersecurity Amid Rise of Credential-Based Compromise

Recent insights reveal that banks are increasingly confronted with cyber threats that exploit stolen or falsified credentials. This shift from traditional attack methods highlights the urgent need for financial institutions to adapt their cybersecurity strategies. Key Points Credential-based compromises are becoming the primary method of cyber intrusion, replacing older brute-force tactics. Financial institutions are particularly […]

Read More →