AI Cybersecurity Software ProductOthersPhen.AI CheckMate Advance Behavioral Analytic Solution Cybersecurity is critical for organizations of all sizes and industries as it helps protect sensitive information such as financial data,…Olumide AkinwekomiJanuary 30, 2023
AI Cybersecurity Software ProductOthers CheckMate is Leading the Evolution of Artificial Intelligence (AI) in the Cyber Security World Offering “Zero Trust Security” Artificial intelligence (AI) has the potential to revolutionize the field of cyber security. By using machine learning algorithms, AI systems…Olumide AkinwekomiJanuary 11, 2023
OthersPress Release We are happy to announce that Canfield CyberDefense Group, has been approved to be a Certified Third-party Assessor Organization (C3PAO).Olumide AkinwekomiAugust 2, 2021
Others Continuous Risk Assessment and Information Technology (IT) Environment’s Health Every organization, regardless of its mission statement or business operating sector, has its own risk profile. Each organization should carry…Olumide AkinwekomiJuly 28, 2021
AI Cybersecurity Software ProductOthersThreat Post Defending Against the Current Russian Cyber Threats The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity advisory about…Olumide AkinwekomiMay 17, 2021
Breaches and incidentsOthers How Are You Prioritizing Resilience in the Cyberspace? Cyber resilience is an Enterprise's ability to plan, adapt, and recover when cyberattacks occur. If an Enterprise can protect itself…Olumide AkinwekomiFebruary 18, 2021
Others Warning on VPN Vulnerability As the organization adapts to Coronavirus, there is a spike in remote work. Organizations are required to connect to remote…Olumide AkinwekomiOctober 28, 2020
Others CYBERSECURITY IN THIS DISPENSATION In the last few years, the cybersecurity practice force is changing speedily, and the impact of this test becomes more…Olumide AkinwekomiAugust 3, 2020
Others Critical Flaws of Zoom Video Conferencing Software that are Prone to Attackers Many individuals have resorted to using Zoom, especially since the beginning of this pandemic which has created restrictions in schools,…Olumide AkinwekomiJune 8, 2020
Others Impersonation Attacks on Microsoft Teams Some Team users have experienced two different attacks by phishing on Office 365 logins. A compelling cyber threat that imitates…Olumide AkinwekomiMay 7, 2020