CyberTalk

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Two-thirds of organizations are not prepared for AI risks

    AI concept art

    EXECUTIVE SUMMARY: Artificial intelligence is the new epicenter of value creation. Employees across industries are ecstatic about deploying easily accessible generative AI tools to elevate the quality of their output and to improve efficiency. According to the latest research, 60% of employees use generative AI tools to augment their efforts. Roughly 42% of organizations say […]

    Source: CyberTalk | Published: May 8, 2024
  • The all-star AI-powered, cloud-delivered security platform you need

    EXECUTIVE SUMMARY: Cyber criminals are weaponizing advanced tactics, including intricate social engineering campaigns, to carry out malicious activities. Last year, social engineering attempts rose by 464%. Often a result of social engineering attempts, ransomware attacks have reportedly increased by 90%. Amidst this unsettling attack landscape, it can be difficult and stressful to secure data and […]

    Source: CyberTalk | Published: May 7, 2024
  • Key strategies for building cyber resilience in 2024

    By Deryck Mitchelson, Field CISO EMEA, Check Point. This article was originally published via the World Economic Forum and reprinted with permission. Cyber resilience is more than just a buzzword in the security industry; it is an essential approach to safeguarding digital assets in an era where cyber threats are not a matter of “if” […]

    Source: CyberTalk | Published: May 6, 2024
  • Mastering cyber threat prevention and maximizing opportunities

    Gary Landau has been leading IT and information security teams for over 25 years as part of startups as well as large global organizations. He is currently a Field CISO with Unisys Security Services, where he supports companies in many different industries. His mantra is “keep making it better” and he is passionate about continuously […]

    Source: CyberTalk | Published: May 3, 2024
  • 7 tips for preventing pernicious password-based breaches

    EXECUTIVE SUMMARY: Remember the infamous 2021 SolarWinds supply chain attack? Cyber criminals were able to coordinate the attack because an intern rendered the password ‘solarwinds123’ publicly accessible via a GitHub repository, in 2018. While this led to an extreme business compromise situation, SolarWinds is not the only organization that’s ever struggled with password management… World […]

    Source: CyberTalk | Published: May 2, 2024
  • AI, CVEs and Swiss cheese

    By Grant Asplund, Cyber Security Evangelist, Check Point. For more than 25 years, Grant Asplund has been sharing his insights into how businesses can best protect themselves from sophisticated cyber attacks in an increasingly complex world. Grant was Check Point first worldwide evangelist from 1998 to 2002 and returned to Check Point with the acquisition […]

    Source: CyberTalk | Published: May 1, 2024
  • How AI can benefit zero trust

    EXECUTIVE SUMMARY: The zero trust framework is a cornerstone of modern cyber security threat prevention and defense architectures. At its core, zero trust calls for continuous verification of every request and transaction within a network — regardless of source or destination. As cyber threats take on new characteristics, some organizations are looking to artificial intelligence […]

    Source: CyberTalk | Published: Apr 30, 2024
  • Say goodbye to standard security for smartphones (you need this instead)

    By Zahier Madhar, Lead Security Engineer and Office of the CTO, Check Point. Smartphones play a pivotal role in all of our lives. In a way, smartphones today are a sort of a diary, storing pictures, organizing them and displaying them in a story telling modality. Smartphones are much more than a piece of technology […]

    Source: CyberTalk | Published: Apr 29, 2024
  • Zero Trust strategies for navigating IoT/OT security challenges

    Travais ‘Tee’ Sookoo leverages his 25 years of experience in network security, risk management, and architecture to help businesses of all sizes, from startups to multi-nationals, improve their security posture. He has a proven track record of leading and collaborating with security teams and designing secure solutions for diverse industries. Currently, Tee serves as a […]

    Source: CyberTalk | Published: Apr 26, 2024
  • Ransomware attack causes city street lights to “misbehave”

    EXECUTIVE SUMMARY: In England, Leicester City is experiencing persistent problems with its street light system due to a recent cyber attack. While the street lights are ordinarily switched on and off at dawn and dusk, for the last six weeks, street lights across Leicester have remained illuminated during both the day and night. In some […]

    Source: CyberTalk | Published: Apr 25, 2024
  • The evolution from BEC to BCC

    David Meister is a valued technology expert with over 15 years of experience in technical and consultancy roles across a range of technologies, including networking, telecommunications, infrastructure, and cyber security. After starting his career as a network engineer, David’s passion for using technology to solve problems led him through various roles, including engineer, technical manager, […]

    Source: CyberTalk | Published: Apr 24, 2024
  • Top 10 things CISOs should know about AI security tools

    EXECUTIVE SUMMARY: As reported by executives, the top tangible benefit of AI is cyber security and risk management optimization. Right now, nearly 70% of enterprises say that they cannot effectively respond to cyber threats without AI security tools. However, despite the decidedly viable and valuable AI-based security opportunities that exist, sensationalism continues to obscure how […]

    Source: CyberTalk | Published: Apr 23, 2024
  • Exit mobile version