Blog

Insights on the industry

In the landscape of cybersecurity, the world is faced with a critical challenge – a severe shortage of cybersecurity professionals. The consequences of this workforce gap are profound, leaving organizations vulnerable to sophisticated cyber threats. According to the (ISC) Cybersecurity Workforce Study in 2023, the global cybersecurity workforce gap reached an alarming 4 million unfilled positions, marking a 12.6% year-over-year increase. This growing gap shows...

Read More

The Countdown Begins: Google's Inactive-Account Policy Takes Effect If you've got a Google account sitting idle for a while, it's time to give it some attention. In a recent announcement, Google unveiled its updated inactive-account policy, set to roll out this week. If your account hasn't been in action for at least two years, it could be on the chopping block, erased in a phased approach...

Read More

In a recent discovery by cybersecurity firm Hunters' Team Axon, a critical design flaw has been unearthed in Google Workspace's domain-wide delegation (DWD) feature. Named "DeleFriend" by the researchers, this vulnerability poses a serious threat, allowing potential attackers to exploit existing delegations, leading to privilege escalation and unauthorized access to Workspace APIs. The Anatomy of DeleFriendDomain-wide delegation facilitates comprehensive delegation between Google Cloud Platform (GCP) identity...

Read More

In the world of cinema, hacking scenes have become a staple, often leaving audiences both entertained and bewildered. While these portrayals are far from accurate, they provide a unique blend of suspense and amusement. In this lighthearted exploration, we'll power rank some of the most unrealistic and downright absurd hacking scenes, making it clear that these moments are all good fun. The Worst Hacking Power Rankings NCIS:...

Read More

In a world increasingly dominated by digital landscapes, the importance of cybersecurity cannot be overstated. PivIT Strategy recently took the lead in addressing this critical concern by organizing a Cybersecurity Networking Event in Charlotte. Held at the vibrant Legion Brewing in South Park, the event featured Natalie Suarez, a distinguished Principal Solutions Advisor with over 25 years of experience in IT and Cybersecurity, including the...

Read More

QR codes have become an integral part of our daily lives, offering a quick and convenient way to access information. However, with their increasing popularity, there's also a rise in potential risks, as QR codes can be exploited for malicious purposes. Kaspersky found that there were over 28,000 malicious QR codes used in phishing and malware distribution schemes worldwide. In this blog, we'll explore how...

Read More