How a Teen Hacker Took Down a Fortune 500 Company

How a Teen Hacker Took Down a Fortune 500 Company

In the realm of cybersecurity, we usually think of seasoned experts and sophisticated criminal organisations…

From Hollywood to Hospitals: The Cost of Cybercrime in Everyday Life

From Hollywood to Hospitals: The Cost of Cybercrime in Everyday Life

Cybercrime isn’t a speculative danger that only technology firms or government agencies are concerned about. Every…

5 Real-Life Cybercrime Cases That Shocked the World

5 Real-Life Cybercrime Cases That Shocked the World

When people think about cybercrime, they envision phishing email scams or theft of credit cards. However,…

What’s next for cyber Policing: AI vs. Hackers

What’s next for cyber Policing: AI vs. Hackers

In this digital age it’s not always about the masked robbers and stolen wallets. It usually…

How Governments Are Fighting Back Against Cybercrime

How Governments Are Fighting Back Against Cybercrime

Cybercrime has grown from a few isolated hacks to a global multi-billion-dollar business. Phishing schemes, phishing…

Should We Pay Ransomware Demands? The Ethics of Cyber Extortion

Should We Pay Ransomware Demands? The Ethics of Cyber Extortion

Imagine waking up to discover that your company’s complete system is locked. The files are encrypted…

Hacktivism against Cybercrime: Where Do We Draw the line?

Hacktivism against Cybercrime: Where Do We Draw the line?

In this digital age hackers aren’t just shadowy characters who steal credit cards or distributing…

Cybercrime Laws You Should Actually Know (But Probably Don’t)

Cybercrime Laws You Should Actually Know (But Probably Don’t)

Cybercrime isn’t something that is a shadowy part of the internet. It’s a global multi-billion-dollar…

1 37 38 39 40 41 44

This Case Studies & Stories category gives actual examples and in-depth accounts of cybersecurity-related incidents as well as solutions and achievements. Learn from other companies’ experiences as they share practical learnings and gain insight into the most efficient strategies for preventing, finding and responding to cyber-related threats. These stories illustrate problems and best practices to inform your security choices and actions.