"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
When we think of hacking, we don’t really think of social hacking. This type of hacking based on human weaknesses...Read more
Security Operations Centers (SOC) are evolving from monitoring and responding to threats to identifying risks and collaborating with partners to...Read more
Recently, threat actor leverage MFA fatigue to breach into Uber, Microsoft and Cisco. The cybercrime gang Lapsus$ is very keen...Read more
An insider threat is any potential risk that an employee might use privileged or unauthorized access, information, or resources to...Read more
Today’s supply-chain cyber-attack threats are not just about efficiency and visibility but also trust and transparency. Increasing attacks on the...Read more
Small businesses have a lot going for them. They have nimbleness, cost-consciousness and an ability to serve their local communities...Read more