article thumbnail

News alert: 360 Privacy secures $36M to deliver turnkey digital executive protection platform

The Last Watchdog

As cyber attacks continue to grow in frequency and sophistication, they are significantly outpacing traditional defenses, targeting executives across both the digital and physical world. In 2024, the average cost of a data breach reached $4.88 Today, 360 Privacy serves one-third of Fortune 100 companies as customers.

B2C 100
article thumbnail

GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

The Last Watchdog

Given the climbing rate of remote workers, SASE has shifted from being a developing solution to being very timely, sophisticated response to leading-edge cyber attacks. About the essayist: Postan is the former SEO and Content Director of Outbrain, and previously worked in the gaming, B2C and B2B industries for more than a decade.

IoT 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Yodel Confirms Cyberattack

Heimadal Security

It was initially known as the Home Delivery Network, until it bought the B2B and B2C businesses of DHL Express UK and afterward, renamed itself as Yodel in May 2010. Yodel is a delivery service company from the United Kingdom. What Happened? A cyberattack has caused delays in package distribution and online order tracking for […].

B2C 105
article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Threat actors are continually looking for better ways to target organizations, here are the top five attack vectors to look out for in 2022. Malicious actors are continually looking for better ways to carry out successful cyber attacks. Remote Technology. Conclusion.

IoT 140
article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. So we want to provide the ability for an enterprise to just eliminate attack vectors.”

Passwords 164
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites.

article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

Each new technology comes with its own set of vulnerabilities and potential chinks in the armor for attackers to slip through, making it increasingly challenging to maintain robust defenses. Moreover, the asymmetric nature of cyber attacks exacerbates the problem.