Yearly Archives: 2019
Out-Smarting the Cybersecurity Skills Shortage
By Ofer Or, VP of Product, Tufin Organizations across the globe are struggling to recruit the talent they need for their open security roles. Unfortunately, the problem is expected to […]
Watch out, hackers are targeting CVE-2018-0296 Cisco fixed in 2018
Cisco has warned customers that hackers continue to target Cisco ASA and Firepower Appliance products by exploiting the CVE-2018-0296 flaw. Experts warn that threat actors continue to exploit the CVE-2018-0296 […]
Maze Ransomware operators threaten victims to publish their data online
The victims of the Maze Ransomware now face another threat because operators behind the malware could become publish their data online. The victims of the Maze Ransomware are facing another […]
Why Insider Data Breaches Will Continue in 2020
By Randy Reiter CEO of Don’t Be Breached Insider Data Breaches That Occurred in 2019 More than two-thirds of corporations are not prepared to combat Insider Data Breaches as reported […]
The Growing Costs of Cyber Attacks on UK Small Businesses
By Dan Baker, Content Writer, SecureTeam The amount of cyber attacks in the UK and across the world continues to grow each year and small businesses are increasingly the targets […]
Multifactor Authentication & The Sobering Reality for Organizations Without It
By François Amigorena, CEO and founder, IS Decisions Organizations without multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. Compromised credentials are […]
Automatic for The SOC People
How Automation Can Quell Those Pesky False Positives By Steve Salinas, Director of Product Marketing, Siemplify As a newly hired cybersecurity analyst, you’re excited to start vanquishing threats and thwarting […]
The Only Recession in Cybersecurity
Sleep-deprived, overworked and fatigued security professionals impose huge risks to an organization By Karl Sharman, Vice-President, BeecherMadden Tired, overworked and fatigued employees pose huge risks to organizations. It’s obvious to […]
The Email Security Challenges
By Milica D. Djekic Let’s try to remember the times of the old, good letters when the postman was knocking at your door or apparently leaving the message in your […]
The Rise of Cybercrime-As-A-Service
And What It Means for Businesses By Mark Belgrove, Head of Cyber Consultancy, Exponential-e In a sea of increasingly complex cyber warfare and nation-state hackers, it can be easy to […]
The Perspectives Of The 5th Industrial Revolution
By Milica D. Djekic New days bring us so many new things. It would appear that we literally get overwhelmed by emerging and cutting-edge technologies. So many novel solutions deal […]
The Internet Got Safer In 2019: A Cybersecurity Year in Review
By Daniel Kanchev, Chief Enterprise Architect, SiteGround It’s just a fact: In 2019 the Internet got safer by default. SSL encryption adoption is now at an all-time peak, with the […]
Happy Holidays! 2020 Around the Bend…
Put your smartphone down. Turn off your laptop. Leave the server room. Stop texting. It’s family time. It’s people time. Look those you love, in the eyes, let the know. […]
The Blockchain And Wireless Technologies
By Milica D. Djekic A Perspective The Blockchain by itself is any well-protected record of data that is transmitted through a cryptographically assured communications channels. It may appear that such […]
Despite Spending an Average of $18.4 Million on Cybersecurity Solutions, Organizations still get Breached
Enterprises plan on increasing their security budgets in the next year too. However, the key to preventing breaches relies upon accurately identifying and remediating gaps in current security defenses. By: […]
Emotet distributed by emails posing as German authorities, BSI warns
BSI, Germany’s federal cybersecurity agency warns of an active malspam campaign that distributing the infamous Emotet banking Trojan. Germany’s federal cybersecurity agency BSI is warning of an active malspam campaign […]
The Security Challenges of Robotic Process Automation—A Primer
By Kevin Ross, Global Solutions Engineer, CyberArk Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These systems enable software robots to replicate the actions […]
How to Become a Cybersecurity Sleuth?
By Edith Santos, Director of Global Incident Response for NTT, Ltd. So, you want to become a cybersecurity sleuth? Excellent! We need you and so does everyone else. A quick […]
Cyber Safety Tips for The Holidays
Practicing Good Cyber Hygiene to Avoid Holiday Cyber Attacks By Dr. Bob Duhainy, Walden University Doctor of Information Technology core faculty member While millions of holiday shoppers will be spending money […]
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days […]
Visibility and Anomaly Detection in The Age of Iot
By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the […]
Microsoft fixes CVE-2019-1458 Windows Zero-Day exploited in NK-Linked attacks
Microsoft’s December 2019 Patch Tuesday updates fix a total of 36 flaws, including CVE-2019-1458 Windows zero-day exploited in North Korea-linked attacks Microsoft’s December 2019 Patch Tuesday updates address a total […]
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once […]
Adobe Offers CCF – an Open Source InfoSec Standard
The Common Control Framework (CCF) by Adobe is the cornerstone of our company-wide compliance strategy. It is a comprehensive set of simple control requirements, rationalized from the alphabet soup of […]
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities and local governments in Texas were hit by a coordinated ransomware attack. The hackers […]
BeyondTrust Cybersecurity Predictions for 2020 & Beyond
2020 Prediction Contributors: Morey Haber, CTO/CISO at BeyondTrust and Christopher Hills, Sr. Solutions Architect, Office of the CTO at BeyondTrust It’s possible that the earliest security predictions began on that […]
Protecting Against Modern Cyberattacks
By Bala Sethunathan, CISO and Global Director of the Security Practice at SoftwareONE Modern cyberattacks are increasing in complexity and sophistication, as hackers are developing attack tools at a faster […]
Ohio Election Day cyber attack attempt traced Russian-Owned Company
Ohio detected and neutralized a cyber attack against its election systems earlier this month, it was traced to a Russian-owned company. Ohio officials thwarted a cyber attack against its election […]
6 Benefits of Using MFT for Encrypted File Transfers
A managed file transfer (MFT) solution is a product that successfully handles all aspects of inbound and outbound file transfers while utilizing industry-standard network protocols and encryption. It can automate […]
Persistent Cybersecurity Industry Challenges: Salary Survey Finds Parity Gaps for Gender, Diversity and Trouble Sustaining Work-Life Balance
By Trevor Daughney, VP of Product Marketing, Exabeam Annually, Exabeam conducts a Cybersecurity Salary, Skills, and Stress Survey* to gain insight on trends in the salaries of security professionals, as […]