The RockYou2024 password leak, one of the largest in history, serves as a stark reminder that even the most complex password should only be ONE part of of the combination lock to your privileged information.
Picture this: a cargo ship gliding through the open sea, its containers stacked high. The crew, busy with their tasks, rely on a delicate dance between operational technology (OT) and information technology (IT). But beneath the surface lies a hidden menace—the spectre of cyberattacks.
The reality is that the same reasons that make AI a compelling threat are the very reasons that should make us pause and proceed with a good deal of caution and scepticism when being offered an ‘AI Security Solution’.
A conversation with Miguel Clarke, GRC and Cyber Security Evangelist at Armor Defense, on how artificial intelligence is reshaping the digital landscape.
With technology continually evolving, cyber criminals will continue to pose a significant challenge to individuals, businesses and organisations during 2024. But what are the key threats we should look out for over the next 12 months? In this blog post, Temi Akinlade, GRC/P Security Advisor at Armor offers his thoughts.
Email security is a huge issue to consider as part of your overall cybersecurity posture. Here our GRC/P Security Advisor Temi Akinlade offers some best practice advice on how to approach it.