Adyen hit with cyberattack in Europe

Adyen, the Dutch payment processor, suffered a significant cyberattack this week, resulting in temporary service disruptions across Europe. The company reported that services were impacted for about eight hours due to a distributed denial of service (DDoS) attack. Key Points Adyen experienced a DDoS attack that disrupted its services in Europe, confirmed via a company […]

Read More →

5 Strategies To Identify AI Deepfakes Posing As Job Candidates

In the rapidly evolving world of recruitment, spotting AI deepfakes posing as job candidates has become crucial. With the alarming rise of sophisticated AI technology, employers need to arm themselves with strategies to identify these increasingly convincing impostors. Source: Forbes Key Points The ability to create realistic deepfake candidates has advanced, with AI-generated identities appearing […]

Read More →

Armis expands vulnerability exposure and assessment capabilities

Armis is stepping up its game in cybersecurity with the launch of its free Armis Vulnerability Intelligence Database. This community-driven database offers real-time insights on exploited vulnerabilities and emerging threats, helping organisations to better prioritise and mitigate risks swiftly. Source: Help Net Security Key Points The Armis Vulnerability Intelligence Database integrates AI insights and exploited […]

Read More →

Cynomi cinches $37M for its AI-based ‘virtual CISO’ for SMB cybersecurity

Cynomi has secured $37 million in funding for its innovative cybersecurity solution designed for small and medium-sized businesses (SMBs). The company, co-led by Insight Partners and Entrée Capital, aims to provide businesses with an intelligent solution to tackle rising cyber threats through its AI-based “virtual CISO”, which offers scalable security operations support. Source: Article URL […]

Read More →

Five Ways CISOs Can Unlock Board Buy-In

As cybersecurity continues to dominate the conversation in boardrooms, CISOs are finding new ways to align their strategies with business objectives. Roi Cohen outlines five impactful strategies for CISOs to secure board support effectively, highlighting the importance of business-oriented communication in the cybersecurity landscape. Source: Forbes Key Points Understanding the language of the board is […]

Read More →

AI Cyber Threats Put Consumers’ Trust In Banks At Risk

In an era where AI is revolutionising banking, it also introduces significant cybersecurity risks for banks, jeopardising consumer trust. With threats like deepfake scams and AI-generated malware on the rise, financial institutions find themselves in a precarious position as they race to protect their customers from fraud. Source: Forbes Key Points Banks are adopting generative […]

Read More →

Complaints about ransomware attacks on US infrastructure rise 9%, FBI says

Ransomware complaints have surged in the US, climbing 9% from the previous year, with notable implications for critical infrastructure. This increase, highlighted in a recent FBI report, underscores the growing cyber threat landscape, particularly for sectors vital to national security and public health. Key Points Ransomware emerged as the top cyber threat to critical infrastructure […]

Read More →

Seasoned Technology and AI Partner Joins Dentons’ Privacy and Cybersecurity Team in Maine

Summary Dentons has announced the addition of Andrew Clearwater to its privacy and cybersecurity team in Portland, Maine. Clearwater joins from OneTrust, a prominent security software provider. His expertise is expected to bolster Dentons’ capabilities in navigating the intricate landscape of privacy and cybersecurity law. Source: Cybersecurity Law Report Key Points Andrew Clearwater joins Dentons […]

Read More →

The Keys To Strong Identity Life Cycle Management

Organisations are increasingly recognising the importance of effective identity life cycle management (ILCM) as they navigate the complexities of modern business environments. The article discusses the critical role ILCM plays in enhancing security, compliance, and operational efficiency, making it essential reading for anyone involved in enterprise cybersecurity or data governance. Source: Article URL Key Points […]

Read More →