Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The EU Cyber Diplomacy Toolbox: Shaping Global Cybersecurity Standards

The EU Cyber Diplomacy Toolbox is a framework developed by the European Union to enhance its ability to prevent, deter, and respond to malicious cyber activities that may threaten its external security. The European Commission adopted the Toolbox in 2017 as part of the EU's broader strategy to promote a global, open, stable, and secure cyberspace.

Protecting Student Health Data: TPRM for Higher Education

Higher education institutions are a growing target for cybercriminals due to the high volume of sensitive information and data they collect and use. From enrollment to matriculation, colleges and universities utilize student data for everything from financial aid packages to determining eligibility for coursework. According to a report by Check Point Research, the education sector (specifically higher education) has experienced significantly more cyber attacks than any other industry in recent years.

Telemetry Data: Examples & Types of Data Collected

Telemetry data automatically collects and sends data from various devices to a central location for analysis and monitoring. However, not all data is created equal. To better understand data telemetry and how to leverage it, you also need to understand the different types of data telemetry. This article will discuss various telemetry data examples and types to help you better understand the topic.

Insider Threat vs. Insider Risk: What's the Difference?

Cybersecurity issues more commonly arise from insider activity than outside activity. Of course, attacks by external threat actors still occur, but insider incidents cause most data breaches and leaks. Often, insider threat and insider risk are used interchangeably to describe cybersecurity risks posed by people with inside knowledge of a company.

Verizon: The Percentage of Users Clicking Phishing Emails is Still Rising

The long-awaited annual Verizon Data Breach Investigations Report is out, and it’s made very clear that users continue to be a problem in phishing attacks. I’ve said it before, if you only read one report each year, the Verizon Data Breach Investigations Report is one you shouldn’t miss. And this year’s report starts off with a topic close to our hearts here at KnowBe4: users engaging with phishing emails and clicking links.

Protecting Your Digital Footprint: The Dangers of Sharing Too Much on Social Media

For most folks, social media has become integral to their daily lives in today's hyperconnected world. They use platforms like Facebook, Twitter and Instagram to share their thoughts, experiences and personal moments with friends and family. Being online has even become a business for content creators, who share their insights and thoughts of their daily lives, from “Getting Ready With Me” (GRWM) to recording video trends of jumping over your camera to the beach or the latest dance craze.

Retrieval Augmented Generation (RAG): Unlocking the Power of Hybrid AI Models

Language models have revolutionized natural language processing, enabling machines to generate human-like text with remarkable fluency and coherence. However, despite their impressive capabilities, traditional language models often need help with knowledge-intensive tasks that require factual accuracy, external knowledge integration, and contextual awareness.