Headlines

Morgan Sarah

Hi, I'm Sarah Morgan, an investigative journalist focusing on counterterrorism and intelligence. I'm driven by the belief that understanding the root causes of terrorism and addressing security gaps can contribute to a safer society.

The Evolution of Patch Tuesday: Assessing the Adequacy in Modern Cybersecuritywordpress,patchtuesday,cybersecurity,evolution,adequacy,moderncybersecurity

The Evolution of Patch Tuesday: Assessing the Adequacy in Modern Cybersecurity

The Evolution of Patch Tuesday and the Growing Cybersecurity Challenges The Promise and Reality of Patch Tuesday Microsoft’s Patch Tuesday, which recently celebrated its 20th anniversary, was introduced in 2003 as a way to consolidate and organize the patching process. By releasing security updates on a predictable schedule, Microsoft aimed to bring structure to the…

Read More
The SolarWinds Scandal: SEC Brings Charges Against Company and CISO for Fraud and Cybersecurity Breacheswordpress,SolarWinds,scandal,SEC,charges,company,CISO,fraud,cybersecuritybreaches

The SolarWinds Scandal: SEC Brings Charges Against Company and CISO for Fraud and Cybersecurity Breaches

SEC Charges SolarWinds and Its CISO With Fraud and Cybersecurity Failures The Securities and Exchange Commission (SEC) has filed charges against SolarWinds and its Chief Information Security Officer (CISO), Timothy G. Brown, alleging that the company misled investors about its cybersecurity practices and known risks. The charges stem from alleged fraud and internal control failures…

Read More
"Exploring Canada's Decision to Ban WeChat and Kaspersky on Government Phones"canada,ban,wechat,kaspersky,governmentphones

“Exploring Canada’s Decision to Ban WeChat and Kaspersky on Government Phones”

Nation-State Canada Bans WeChat and Kaspersky on Government Phones Canada has announced a ban on popular Chinese messaging app WeChat and Russian platform Kaspersky on government smartphones and other mobile devices. The decision was made due to the privacy and security risks that these applications pose. The Chief Information Officer of Canada determined that WeChat…

Read More
The Future of Cybersecurity: Safeguarding Borderless Enterpriseswordpress,cybersecurity,future,safeguarding,borderlessenterprises

The Future of Cybersecurity: Safeguarding Borderless Enterprises

CISOs face new security challenges in a borderless enterprise landscape The COVID-19 pandemic has accelerated the adoption of remote work and collaboration tools, leading to a new frontier for Chief Information Security Officers (CISOs). As organizations embrace a borderless enterprise landscape, CISOs are tasked with forging a strong security posture to protect their organizations from…

Read More
Unmasking the Octo Tempest: The Terrifying Rise of Physical Violence as a Social Engineering Tacticwordpress,socialengineering,physicalviolence,octotempest,unmasking,rise,tactic

Unmasking the Octo Tempest: The Terrifying Rise of Physical Violence as a Social Engineering Tactic

The Rise of Octo Tempest: A Dangerous and Unprecedented Cybercrime Group Introduction Octo Tempest, a financially motivated hacking group, has recently been branded as one of the most dangerous financial criminal groups by Microsoft’s Incident Response and Threat Intelligence team. This group, also known as 0ktapus, Scattered Spider, and UNC3944, has been active since early…

Read More
Integrating Global Expertise: UN Chief sets up Panel for International Governance of Artificial Intelligencewordpress,globalexpertise,UN,panel,internationalgovernance,artificialintelligence

Integrating Global Expertise: UN Chief sets up Panel for International Governance of Artificial Intelligence

U.N. Chief Appoints 39-Member Panel to Advise on International Governance of Artificial Intelligence The Role of the Panel U.N. Secretary-General António Guterres has taken a significant step in addressing the international governance of artificial intelligence (AI) by appointing a 39-member global advisory panel. The panel, which includes experts from government, the private sector, the research…

Read More
Navigating Turbulent Waters: Strategies for Sustaining Business Amidst Controversywordpress,businessstrategy,controversy,sustainability,crisismanagement,reputationmanagement,publicrelations,brandmanagement,stakeholderengagement,riskmanagement

Navigating Turbulent Waters: Strategies for Sustaining Business Amidst Controversy

The IT Professional’s Blueprint for Compliance Introduction In today’s digital age, organizations must navigate a complex web of regulations and frameworks to ensure the security and privacy of their data. This is especially true for IT professionals, who play a vital role in implementing and maintaining robust compliance measures. In this article, we will explore…

Read More
The Rise of AI Vulnerabilities: Google Expands Bug Bounty Program to Protect Against Emerging Threatswordpress,AIvulnerabilities,bugbountyprogram,emergingthreats,Google

The Rise of AI Vulnerabilities: Google Expands Bug Bounty Program to Protect Against Emerging Threats

The IT Professional’s Blueprint for Compliance Introduction In an increasingly digitized world, where data breaches and cyber threats have become commonplace, it is paramount for IT professionals to prioritize compliance with various security frameworks, such as HIPAA, NIST, CIS-CSC, Essential Eight, and Cyber Essentials. The ever-growing number of vulnerabilities in artificial intelligence (AI) systems and…

Read More