Cybersecurity articles

Explore a featured selection of my writing work below.

Social Engineering Examples: Real-World Tactics

Social engineering means psychologically manipulating or “tricking” someone to get something valuable out of them. Cyber attackers use social engineering tactics to trick your employees into divulging company secrets, leaking confidential data, or handing over large sums of money.

98% of all cyberattacks apply social engineering in some way to initiate the attack. The global average cost of an attack in 2024 was USD 4.88 million - including financial theft and regulatory fines. The loss of bran...

SMEs and the Rising Tide of Ransomware and Targeted Cyber Attacks

Ransomware is a cybersecurity threat involving attackers encrypting information on a system and demanding a ransom for a decryption key. Attackers have developed this attack method further to involve double extortion, where they not only steal data and move it to a different location but also threaten to release it if the company doesn’t pay the ransom.

With the rise of Ransomware as a Service (RaaS), it has become much easier for attackers to launch and maintain ransomware campaigns without de

Why Context Is King: Cloud Security with Comprehensive Visibility

Cloud adoption is essential for organizations looking to deliver cutting-edge customer experiences through digital transformation. However, as you move your digital assets to the cloud, the risk levels that you manage increase significantly. While your cloud provider is responsible for the security of the cloud, your organization is responsible for security in the cloud. This means that organizations today must monitor a vast array of resources and configurations in their cloud environment.

But

Embracing Holistic Cloud Security: Achieving Automated, Continuous Compliance

As more organizations migrate their operations to the cloud, they also find themselves dealing with the complexities of the modern cloud security landscape. Cloud identity and access management(IAM), object storage, and API keys can be tricky to navigate, and misconfigurations prove to be expensive. Expert insights cloud statistics reveal that 80% of businesses experienced a cloud security incident in the past year alone, with average data breach costs reaching a staggering US$3.8 million. Finan

Data governance and data security: what’s the difference?

Data governance is the systematic management of an organization’s overall data strategy. It defines and enforces policies and procedures for different aspects of data management, from collection to cleaning, classification, integration, storage and use. It establishes data quality standards that everyone in the organization is expected to follow. The goal is to ensure all data management technologies and processes always comply with industry standards, laws and regulations.

In contrast, data security focuses only on data protection. It includes the tools and processes that prevent unauthorized access. It implements verification (like password checks) so that only verified users can access data. Different access levels are defined so that some users can only read data while others can read and update the dataset.

What is CIS Benchmarks? - CIS Benchmarks Explained - AWS

Tools such as the CIS Benchmarks are important because they outline security best practices, developed by security professionals and subject matter experts, for deploying over 25 different vendor products. These best practices are a good starting point for creating a new product or service deployment plan or for verifying that existing deployments are secure.

When you implement CIS Benchmarks, you can better secure your legacy systems against common and emerging risks by taking steps such as th

Microsoft report on Russian cyber attacks on Ukraine

Microsoft detected destructive cyberattacks against Ukraine and released a special report on April 27, 2022, titled “Special Report: Ukraine.” DHS warns Ukraine invasion Russian cyberattack frequency may increase and potentially become even more aggressive. Cyber threat actors have already caused significant damage and may exploit any number of vulnerabilities that either already existed or emerged as a consequence of recent cyber onslaughts.

Numerous global news and social media outlets are in