Stephanie van Wissen is Editor and Copywriter at ON2IT. She has a background in communications and marketing. She loves to write, as well as explore other creature pursuits, such as TTRPGs and digital art.
If youโve read any cybersecurity articles lately, youโve likely come across the term โever-evolving cyber threat landscape.โ Itโs one of those phrases that gets thrown around a lot โ especially in AI generated content โ almost to the point of sounding clichรฉ. But here’s the truth: as clichรฉ as it may sound, it’s not just a buzzword.
Even if youโre an IT professional feeling a bit skeptical about the boardโs intentions, you can still see that their involvement is a great chance to align security measures with the companyโs broader goals. Itโs all aboutย framing this as a partnership,ย not a critique. One of the best ways to do that is through a cybersecurity assessment that actually makes sense.
How do you stop these modern bankrobbers from targeting your financial institution? In this Breaking the Bank episode of our Threat Talks podcast, our special guest and renowned cybersecurity expertย Jayson E. Streetย shares his experiences on how he ethically โrobsโ banks to reveal security weaknesses.
Cyberattacks on healthcare organizations can put patientsโ lives and entire organizations at risk. There are numerous reasons why cyber attackers seem to favour healthcare facilities as a target: private patient information is worth a lot of money, medical devices are easy entry points, and thereโs a lot of outdated technology.
There was a time when todayโs tech-giant Apple faced bankruptcy. What happened, and how did Apple get to where it is now despite facing adversity?
Join us on the latest episode of Threat Talks, aptly named ‘Authentication Apocalypse.’ Our hosts, Lieuwe Jan Koning and Luca Cipriano, explore the pressing topic of authentication with Harald Bosman, a seasoned endpoint engineer from AMS-IX.
In this โSuppy chain โ Business as usual?โ episode of Threat Talks, Lieuwe Jan Koning and Luca Cipriano dive into the escalating risk of supply chain attacks amid growing reliance on third-party and open-source software. Featuring insights from Matthijs Zwart, CIO and CISO of Vitens, the discussion explores the implications of these threats in critical sectors like water supply.
Adopting a transformative cybersecurity strategy can redefine business success. While the current adoption rate or Zero Trust โ a transformative cybersecurity strategy โ among large enterprises is just 1% as of January 2023, Gartner projects a growth to 10% by 2026.