Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Developing a Culture of Cybersecurity Within Your Organization

Building a cyber-resilient organization requires more than implementing the best cybersecurity practices. Cybersecurity must be woven into the culture of the organization from the top down. Because 95% of data breaches result from human error, creating a cybersecurity culture can significantly cut down on security breaches by emphasizing the importance of cybersecurity. Cybersecurity is only as strong as its weakest link.

Albertsons Grocery Chain Gets Hacked: Customer and Employee Data Exposed

Albertsons is a major grocery chain in the United States. The company is based in Boise, Idaho, and oversees a huge range of different grocery stores throughout the country. Stores like Star Market, Tom Thumb, Acme, Safeway, Vons, Balduccis, Food Lover's Market, Shaw's, Albertsons, and more.

What is the Cyber Kill Chain in Cybersecurity?

The Cyber Kill Chain is a significant piece of work from Lockheed Martin in 2011. The Chain outlines seven essential points at which an IT team can intercept a cyberattack. Numerous experts took the process a bit further to eight steps: “reconnaissance, weaponization, delivery, exploitation, installation, command and control, actions on the objective, and monetization.”

Celebrating Australia's Privacy Awareness Week 2023

When a country throws a privacy party, Cloudflare is there! We are proud to be an official sponsor of the Australian Privacy Awareness Week 2023, and we think this year’s theme of “Privacy 101: Back to Basics” is more important now than ever. In recent months, Australians have been hit with the news of massive personal data privacy breaches where millions of Australian citizens' private and sensitive data was compromised, seemingly easily.

Decoding the Expanding Acronyms in Identity and Access Management (IDAM)

In the ever-evolving world of technology, acronyms seem to multiply faster than ever before! From AI to IoT to CRM and SaaS, it cab be tricky to keep up to speed and make sense of what they all mean. One area that is no exception to this acronym explosion is Identity and Access Management (IDAM). As businesses increasingly prioritize data security and user privacy, IDAM has become a crucial component of their overall digital strategy.

Why are passwords so difficult to remember?

We all have a lot of passwords to keep track of on a daily basis, whether they’re for shopping websites, emails, social media, or the workplace. It’s practically impossible to remember login information for each of them. But without these crucial bits of data, we can’t get to where we need to go online. It is estimated that over 300 billion passwords are currently in use, which equates to around 38.4 passwords per internet user.

The Total Guide On CVSS (Common Vulnerability Scoring System)

CVSS or Common Vulnerability Scoring System is a framework that numerically characterizes the severity of software vulnerabilities between the range of 0-10. CVSS scores help infosec organizations with vulnerability management and prioritization of vulnerabilities for efficient remediation.