atlas news
    
Security Intelligence
24  janvier     17h00
Are successful deepfake scams more common than we realize?
Jennifer Gregory    Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are Or is it a deepfake Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of ...
    14h00
How cyberattacks on grocery stores could threaten food security
Jennifer Gregory    Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than, stores, including Hannaford, Food Lion and Stop...
23  janvier     14h00
Taking the fight to the enemy: Cyber persistence strategy gains momentum
Jonathan Reed    The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence actively hunting down...
22  janvier     14h00
2024 Cloud Threat Landscape Report: How does cloud security fail?
Jennifer Gregory    Organizations often set up security rules to help reduce cybersecurity vulnerabilities and risks. The Cost of a Data Breach Report discovered that of all data breaches involved data distributed across multiple environments, meaning that these best laid plans often fail in the cloud...
21  janvier     17h00
Why maintaining data cleanliness is essential to cybersecurity
Josh Nadeau    Data, in all its shapes and forms, is one of the most critical assets a business possesses. Not only does it provide organizations with critical information regarding their systems and processes, but it also fuels growth and enables better decision making on all levels. However, like any other...
    14h00
Are attackers already embedded in U.S. critical infrastructure networks?
Jonathan Reed    The threat of cyberattacks against critical infrastructure in the United States has evolved beyond data theft and espionage. Intruders are already entrenched in the nation’s most vital systems, waiting to unleash attacks. For instance, CISA has raised alarms about Volt Typhoon, a state sponsored...
17  janvier     14h00
How to calculate your AI-powered cybersecurity’s ROI
Mike Elgan    Imagine this scenario: A sophisticated, malicious phishing campaign targets a large financial institution. The attackers use emails generated by artificial intelligence AI that closely mimic the company’s internal communications. The emails contain malicious links designed to steal employee...
16  janvier     14h00
The current state of ransomware: Weaponizing disclosure rules and more
Jonathan Reed    As we near the end of , ransomware remains a dominant and evolving threat against any organization. Cyber criminals are more sophisticated and creative than ever. They integrate new technologies, leverage geopolitical tensions and even use legal regulations to their advantage. What once seemed...
15  janvier     14h00
ISC2 Cybersecurity Workforce Study: Shortage of AI skilled workers
Sue Poremba    AI has made an impact everywhere else across the tech world, so it should surprise no one that the ISC Cybersecurity Workforce Study saw artificial intelligence AI jump into the top five list of security skills. It’s not just the need for workers with security related AI skills. The...
14  janvier     14h00
Why do software vendors have such deep access into customer systems?
Sue Poremba    To the naked eye, organizations are independent entities trying to make their individual mark on the world. But that was never the reality. Companies rely on other businesses to stay up and running. A grocery store needs its food suppliers; a tech company relies on the business making...