National Cyber Security Policy Published by the UK

National Cyber Security Policy Published by the UK

The National Cyber Policy focuses on creating a balanced approach towards maximizing the economic benefits of digital technology and proactive management of cyber risks. Programs for enhancing the digital skills of individuals and providing significant roles to the...
New Security Patch for 2nd most used Web Server

New Security Patch for 2nd most used Web Server

The Apache Software Foundation, an American non-profit corporation, which supports various software projects, released a patch on 23rd December 2021 to solve the critical issue in the second-most widely used web-server Apache HTTP Server. The issue raised was that it...
Israel leads a 10-nation cyber attack simulation

Israel leads a 10-nation cyber attack simulation

To minimize cyberattacks against its critical structures, Israel, on the 9th December, led a 10-country, 10-day-long simulation of a major cyberattack on the world’s financial system by “sophisticated” players, which aimed at minimizing the damage to banks and...
Victims pay $700000 in Extra Extortion Fees

Victims pay $700000 in Extra Extortion Fees

According to the CrowdStrike Global Security Attitude Survey, 2021, security vendors compiled multiple interviews, which took place between 2,200 cybersecurity executives and top IT decision-makers in the United States, EMEA (Europe, Middle East and Asia ), and across...
CNIL recommends logging practices for organizations

CNIL recommends logging practices for organizations

The CNIL even included recommendations for general logging procedures which have included traceability, risk mitigation, and data minimization principles. There were targeted suggestions for specific companies regarding the logging practices. All the recommendations...
Critical Infrastructure: New  Threat by Cyber Criminals

Critical Infrastructure: New Threat by Cyber Criminals

Since the pandemic, there has been a tremendous rise in cyber threats and attacks over several workplaces. Critical Infrastructure has also become vulnerable at this point because these cyber-attacks have a huge devastating impact not only on the infrastructure but...
error: Content is protected !!