Trust
Should You Trust Cybersecurity Certifications?
There’s a major discrepancy between the number of organizations that are investing in cybersecurity certification programs and the number that feel prepared for an attack, according to an Immersive Labs report. While ...
Building Trustworthy AI
We will all soon get into the habit of using AI tools for help with everyday problems and tasks. We should get in the habit of questioning the motives, incentives, and capabilities ...
The Importance of Trust in your Insider Risk Program
A hydrologist will tell you water runs downhill. The same goes for policy decisions within companies, regardless of size. If leadership isn’t investing in an initiative beyond their initial messaging, then the ...
When it comes to insider risk, the difference is human
We have a saying here at DTEX: the difference is human. We know that enterprise security is only achievable when the cyber strategy is underpinned by the human element – the only ...
How “Semper Fi” is Key to Cybersecurity
How “Semper Fi” is Key to CybersecurityEstablishing a “loyalty culture” is the key to cybersecuritySemper FiAlways FaithfulLatin for “Always Faithful,” Semper Fidelis is the motto of every Marine — an eternal and ...
An Untrustworthy TLS Certificate in Browsers
The major browsers natively trust a whole bunch of certificate authorities, and some of them are really sketchy: Google’s Chrome, Apple’s Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to ...
Security Vs. Compliance: Understanding the Difference
Security and compliance. With data privacy in the headlines and cyberattacks on the rise, these two simple words have become hot topics across just about every industry. But as conversations about security ...
Cybersecurity and Operational Resilience in 2022
2021 was a record year for headline-making cyberattacks. A Chicago-based insurance firm, CNA Financial, paid a $40 million ransom to recover their data; not to mention the attack on Kaseya in which the ...
VPNs and Trust
TorrentFreak surveyed nineteen VPN providers, asking them questions about their privacy practices: what data they keep, how they respond to court order, what country they are incorporated in, and so on. Most ...
NSA on Authentication Hacks (Related to SolarWinds Breach)
The NSA has published an advisory outlining how “malicious cyber actors” are “are manipulating trust in federated authentication environments to access protected data in the cloud.” This is related to the SolarWinds ...