Remove B2B Remove Cybercrime Remove Technology
article thumbnail

Meet ViVian, a new ID crime chatbot that may be used for future B2B cyber applications

SC Magazine

A new AI-based chatbot tool used to help identity crime victims seek after-hours help was also designed with future B2B applications in mind, including helping employees report a cyberattack when the IT or security team is unavailable. Meet ViVian, short for Virtual Victim Assistance Network.

B2B 121
article thumbnail

Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs

The Last Watchdog

Thus, paired with the rise of cybercrime during that time, the situation has made cybersecurity products a necessity in many cases. They also have other distinctive products like NordPass, Nord Locker or Nord Layer that’s focused towards the B2B layer, which make Nord a big security suite that can be used by everyone.

VPN 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. He previously chronicled the emergence of cybercrime while covering Microsoft for USA TODAY. Erin: So, let’s get started.

article thumbnail

The Financial Dynamics Behind Ransomware Attacks

Security Affairs

Over the last few years, ransomware attacks have become one of the most prevalent and expensive forms of cybercrime. This revolutionized the cybercrime landscape, making it easier for people with minimal technical skills to commit ransomware attacks. She is also a regular writer at Bora.

article thumbnail

McAfee Enterprise & FireEye 2022 Threat Predictions

McAfee

With a focus on strategic intelligence, our team is not only monitoring activity, but also investigating and monitoring open-source-intelligence from a diversity of sources to gain more insights into threat-activities around the globe – and these include an increase in the blending of cybercrime and nation-state operations. By John Fokker.

article thumbnail

Spotlight on Cybersecurity Leaders: Dr. Cheryl Cooper

SecureWorld News

Answer: The decision to pursue a career in cybersecurity came easy to me, as I was tenured as a technology and telecommunications professional for 15 years. I knew that security holes existed for years, but because communications were more commonly B2B, it was not a priority. I enjoyed troubleshooting systems and solving problems.

article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

the flash memory affiliate of Kingston Technology Company, Inc., We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cybercrime. Kingston and the Kingston logo are registered trademarks of Kingston Technology Corporation.

InfoSec 40