"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
In an era of rapidly advancing technology, it's fascinating to see that some old-school tactics remain effective. A recent cyberespionage...
Read moreThe rise of automation has led to an increase in the sophistication and frequency of cyberattacks on online retailers. Automated...
Read moreAs the threat landscape continues to evolve, advanced persistent threat (APT) groups continue to pose a significant risk to organizations...
Read moreSupply chain attacks have become increasingly common in recent years, with cybercriminals exploiting the weakest link in the chain to...
Read morePinduoduo, a Chinese mobile shopping application founded in 2015 by Colin Huang, a former Google employee, has become one of...
Read moreRansomware attacks have become increasingly prevalent in recent years, and cybercriminals are developing ever-more sophisticated techniques to encrypt computer systems...
Read moreThe threat of ransomware has been a growing concern for organizations of all sizes and sectors, and it seems to...
Read moreBusiness email compromise (BEC) attacks have been on the rise in recent years, with losses due to such scams growing...
Read moreResearchers at the Cybersecurity and Infrastructure Security Agency (CISA) have uncovered suspected Russian hackers in a U.S. satellite network. The...
Read moreThe SHA-1 algorithm has been a widely used method for protecting electronic information since 1995, but as computing power continues...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.