Votiro Honored as Silver Winner in 20th Annual Globee® Cybersecurity Awards for 2024

Votiro is thrilled to announce our victory in the 20th Annual 2024 Globee® Cybersecurity Awards! This prestigious recognition celebrates companies and individuals who excel in risk management, threat detection, cloud security, and data privacy. With a judging panel of over 580 experts worldwide, the Globee Awards are inclusive and span across all types of organizations. We are proud to have won silver in the Email Security and Management, as well as the Content Disarm and…

By LoginOnline 2 Min Read

Australian Government Increases Focus on Cybersecurity Following Recent Major Attacks

In response to a series of damaging high-profile data breaches, the Australian government is taking steps to overhaul cybersecurity laws and regulations in the country. Recently, government officials released a consultation paper outlining proposals aimed at positioning Australia as a global leader in cybersecurity by 2030, seeking input from the private sector. One of the key focuses is to address deficiencies in current cybercrime legislation, with intentions to amend the Security of Critical Infrastructure (SOCI)…

By LoginOnline 2 Min Read

Exploring the World of Cyber Technology: Auburn University’s Podcast Decodes Complex Concepts

The McCrary Institute for Cyber and Critical Infrastructure Security at Auburn University has recently introduced a new podcast, aiming to broaden the reach of their research on cybersecurity and facilitate discussions about the dynamic cyber landscape. Frank Cilluffo, the institute’s director and host of the “Cyber Focus” podcast, mentioned in an interview with EdScoop that transitioning from quarterly empirical reports to podcast interviews with cybersecurity experts has allowed for a better understanding of cyber issues…

By LoginOnline 2 Min Read

Unveiling the Truth: Are We Witnessing Real Telekinesis or Top-Secret Chinese Technology?

Exciting news has recently emerged in the scientific community: researchers have confirmed the ability to control objects from a distance. The latest study findings mark a significant milestone in unlocking the potential of the human mind, particularly in the realm of telekinesis. The concept of moving objects with the power of thought has fascinated many enthusiasts since early human ancestors struggled to reach high-hanging fruits. While popularized in pop culture through the Star Wars franchise…

By LoginOnline 2 Min Read

Kansas Bill Aims to Enhance Cybersecurity Following Recent Attack

(TNS) — In response to a foreign cyberattack that crippled the state’s online court system for months, Kansas lawmakers are taking steps to enhance digital security measures. Last year's attack on the state's judicial branch exposed vulnerabilities in the state's cybersecurity. The Kansas House passed a bill on Monday that aims to bolster cybersecurity and IT protocols across all branches of government. Earlier this year, Kansas State University also fell victim to a cyberattack, causing…

By LoginOnline 4 Min Read

New Cybersecurity Training Program for K-12 Schools Launched by Sinclair Community College and D2L

Sinclair Community College, in partnership with D2L, is excited to announce the launch of new cybersecurity training specifically designed for K-12 schools. Cybersecurity attacks are a growing threat, and it is crucial for school administrators to be prepared to prevent and respond to these threats. During a recent summit at the White House, Kyle Jones, chair of information technology and cybersecurity at Sinclair Community College, was inspired to collaborate with D2L on this important initiative.…

By LoginOnline 2 Min Read

Jacksonville Cybersecurity Expert Warns Federal Ransom Ban Will Deter, But Not Eradicate Cybercriminals

JACKSONVILLE, Fla. – According to a Jacksonville cybersecurity expert, implementing a federal ban on using taxpayer money to pay ransoms could potentially deter cyberattacks, but it may also result in unintended consequences. Cybercriminals are primarily motivated by financial gain, often extorting large sums of money. This lucrative business model is exemplified by ransomware thieves who view it as a profitable venture. Lock Supp, the leader of LockBit, affirmed in a podcast that "the business works…

By LoginOnline 2 Min Read