Jason Costain

Jason Costain

Data Protection Specialist

Jason Costain is a security expert specializing in personal data protection. He offers rich insights into incident response planning, cloud security best practices, and the importance of multifactor authentication. With his highly applicable and easy-to-understand publications, Jason empowers his readers with the best methods to protect their sensitive data.

Security North Korean Hackers Use Deepfakes in Crypto Heist

The line between a trusted colleague on a video call and a state-sponsored actor intent on draining corporate accounts has become dangerously blurred, creating a new paradigm of digital impersonation that challenges the very foundation of online trust. This report analyzes a sophisticated

North Korean Hackers Use Deepfakes in Crypto Heist
Security How Did a Dell Zero-Day Go Unpatched for Two Years?

Today, we're speaking with Malik Haidar, a cybersecurity expert with deep experience tracking and dismantling threats within major corporations. We're delving into a recent incident involving a sophisticated Chinese-nexus threat cluster, a critical zero-day vulnerability in a widely used

How Did a Dell Zero-Day Go Unpatched for Two Years?
Security What Is Next for the Gallagher and M.C. Dean Alliance?

With a career built on defending multinational corporations from the digital frontlines, cybersecurity strategist Malik Haidar has a unique perspective on the convergence of physical and digital threats. He joins us to dissect the evolution of a decade-long partnership between Gallagher Security

What Is Next for the Gallagher and M.C. Dean Alliance?
Security Trend Analysis: Government VPN Restrictions

A new digital battleground is emerging where well-intentioned legislative efforts to protect children online are colliding with the fundamental rights to privacy and free expression. This analysis examines the growing trend of governments proposing restrictions on Virtual Private Networks (VPNs),

Trend Analysis: Government VPN Restrictions
Security Are Stolen Credentials Fueling OT Ransomware?

A significant escalation in cyberattacks targeting the world’s industrial backbone has exposed a critical vulnerability not in complex software exploits, but in the very credentials trusted to keep operations secure. In 2025, the number of ransomware groups specializing in industrial targets surged

Are Stolen Credentials Fueling OT Ransomware?
Security Is Your Physical Access Control a NIS2 Liability?

With the European Union's NIS2 Directive now in full force, the lines between physical and cybersecurity have irrevocably blurred, creating a new and challenging compliance landscape. For organizations managing critical infrastructure, the stakes have never been higher, with fines for

Is Your Physical Access Control a NIS2 Liability?
Security Physical Security Forms the Bedrock of Corrections

The integrity of the justice system is often measured by what happens outside of prison walls, yet it is fundamentally guaranteed by the concrete, steel, and advanced systems meticulously engineered within them. While philosophies on rehabilitation and management evolve, the tangible infrastructure

Physical Security Forms the Bedrock of Corrections
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address