Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Verizon Data Breach Investigations Report 2024 Review

As with every year, the Verizon DBIR is released, with data involving more than 10,000 breaches that have been dissected and used to create the report’s baseline. Cyberint’s Research team inspected the document to understand where the cyber security realm is heading, the important trends in data breaches and incidents, and what we need to look for moving forward in 2024.

All About That 8Base Ransomware Group: The Details

First Publishied Nov 6th 2023 Updated May 9th 2024 Last seen on this month, 8Base is a ransomware collective that initiated its operations in April 2022. Despite its relatively short time in the cyber landscape, the group has swiftly garnered a reputation for its forceful strategies and the substantial volume of victims it has affected.

10 Cybercrimes Against Colleges and K-12 Schools, and How To Prevent Them

K-12 schools, colleges, and universities store massive amounts of personal information for students, parents, and employees. This means that, while they may not make the news as much as other breaches, schools, colleges, and universities are under constant attack by modern threat actors.

How do Investigators Know How Fast a Car that was Involved in an Accident was Going in NJ?

After a car accident on New Jersey's busy highways, determining the speed at which the vehicles were traveling is critical for understanding the circumstances and establishing liability. In New Jersey, investigators employ various techniques and methodologies to estimate the pre-impact speed of the cars involved, whether the accident occurred in an urban area like Newark or Jersey City or a rural area like Sussex County.

Addressing Cybersecurity Risks in B2B Transactions: Best Practices and Solutions

In today's digital era, cybersecurity has become a cornerstone of business stability and trust, particularly in business-to-business (B2B) transactions. As companies increasingly rely on digital platforms to conduct operations, the importance of safeguarding sensitive data against cyber threats cannot be overstated. This article explores the best practices and solutions for enhancing cybersecurity measures within B2B contexts.

How Artificial Intelligence Keeps Us Safe Online: 6 Examples

Protecting our digital information comes before its usage. Fortunately, we have artificial intelligence to take care of online security. Today, AI stands among the top cyber security initiatives, and companies admit they see the benefit. Let's explore how AI enhances our defenses with straightforward examples.

Centripetal Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2024

Centripetal is proud to announce that it has won the Next Gen Intelligence Powered Security award from Cyber Defense Magazine (CDM), the industry's leading electronic information security magazine.

What's an Identity Provider (IdP)?

You could have the strongest firewalls, encryption, anti-malware, vulnerability scanners, and risk management tools in the world and still leave one critical gap in your cybersecurity infrastructure — insider threats. And most of those threats come from poor identity management. But what, exactly, is good identity management? How do you pick the right identity provider for your organization?