Monthly Archives: March 2019

4 Concrete Ways Threat Intelligence Can Make Organizations Safer

by Jonathan Zhang, Founder, and CEO, Threat Intelligence Platform The practice of threat intelligence (TI) is gaining momentum, helping organizations of all sizes to better understand and fix their weak […]

Posted in Cyber Security News | Comments Off on 4 Concrete Ways Threat Intelligence Can Make Organizations Safer

How SOAR Can Help You Get Amazing Results from Your Security Analysts

by Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security Security orchestration, automation, and response (SOAR) platforms are becoming increasingly prevalent security operations tools, emerging out of the categories of incident […]

Posted in Cyber Security News | Comments Off on How SOAR Can Help You Get Amazing Results from Your Security Analysts

Inadequate Cyber security Hurts Where it Counts the Most

By Adrejia L. A. Boutté Swafford,  Partner/Attorney at Christovich & Kearney, LLP According to the Merriam-Webster.com Dictionary the term, “cybersecurity,” first used in the year 1998, are the “measures taken […]

Posted in Cyber Security News | Comments Off on Inadequate Cyber security Hurts Where it Counts the Most

South Korea – 1,600 guests at 30 motels secretly live streamed

Four people from South Korea are accused of secretly live streaming, and selling videos made with spy-cam installed in 42 motel rooms at 30 motels in 10 cities in South […]

Posted in Cyber Security News | Comments Off on South Korea – 1,600 guests at 30 motels secretly live streamed

Thomas Edison: An Inspiration for Cybersecurity Inventions

As an inventor and patent holder on various cybersecurity inventions and having been involved in the eary days of the internet, including having the opportunity to be in the RFC […]

Posted in Cyber Security News | Comments Off on Thomas Edison: An Inspiration for Cybersecurity Inventions

EpochTimes Exclusive: Supermicro Backup Server Used by Hillary Clinton Highlights Security Risks of China Supply Chain

BY ANNIE WU, EPOCH TIMES (EXCERPT) March 22, 2019 A little-noticed detail in the FBI’s investigation files related to former U.S. Secretary of State Hillary Clinton’s email servers has highlighted […]

Posted in Cyber Security News | Comments Off on EpochTimes Exclusive: Supermicro Backup Server Used by Hillary Clinton Highlights Security Risks of China Supply Chain

The Four Most Serious Threats Facing Online Businesses In 2018

by Matt Davis, Future Hosting Online crime will cost businesses $2 trillion in 2019. SME’s can’t afford to ignore the risk posed by DDoS attacks, ransomware, phishing, and crypto jacking. […]

Posted in Cyber Security News | Comments Off on The Four Most Serious Threats Facing Online Businesses In 2018

Going Beyond HIPAA Compliance: A Case Study

By Josh Paape A Case Study on how Black River Memorial Hospital Improved Security Posture HIPAA compliance is a big piece of any healthcare organization’s cybersecurity process. However, the goal […]

Posted in Cyber Security News | Comments Off on Going Beyond HIPAA Compliance: A Case Study

Signs That Indicate Your WordPress Site is Hacked

By Julia Sowells Discovering a website hack on time is very important; if you detect it late, it would already have caused you great damage. Here, in this article, we’ll […]

Posted in Cyber Security News | Comments Off on Signs That Indicate Your WordPress Site is Hacked

Google white hat hacker found new bug class in Windows

James Forshaw, a white hat hacker at Google Project Zero, has discovered a new class of bugs that affect Windows and some of its drivers. Google Project Zero hacker James […]

Posted in Cyber Security News | Comments Off on Google white hat hacker found new bug class in Windows

Why Your Cybersecurity Strategy Should Include Managed File Transfer

Protecting Sensitive Files In January of this year, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, came to a settlement for their 2014 […]

Posted in Cyber Security News | Comments Off on Why Your Cybersecurity Strategy Should Include Managed File Transfer

Cyber Security Statistics for 2019

Cybersecurity is often seen as one of those big problems that only large entities like banks, tech companies, and governments have to worry about. In reality, a lot more people […]

Posted in Cyber Security News | Comments Off on Cyber Security Statistics for 2019

Psychological Operations Behind Ransomware Attacks

By Milica D. Djekic The ransomware attacks could cause the sabotage of your entire IT infrastructure and you would agree with us that it’s not pleasant at all to get […]

Posted in Cyber Security News | Comments Off on Psychological Operations Behind Ransomware Attacks

Best Practices to Minimize Negative Impact,Downtime After a Ransomware Infection

by Jim Varner, President, and CEO, SecurityFirst Ransomware has become a scourge to businesses around the globe and always manages to find a way to infiltrate even the best defenses. […]

Posted in Cyber Security News | Comments Off on Best Practices to Minimize Negative Impact,Downtime After a Ransomware Infection

Where do I “Sign”?

A short Review on Digital Signatures by Joe Guerra, Cybersecurity Instructor, Hallmark University The fundamentals of data security are defined as applying techniques, procedures and other means to protect the confidentiality, availability, […]

Posted in Cyber Security News | Comments Off on Where do I “Sign”?

EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

Europol announced the EU Law Enforcement Emergency Response Protocol new protocol for law enforcement agencies in the European Union and abroad to handle major cross-border cyberattacks. Europol announced the adoption […]

Posted in Cyber Security News | Comments Off on EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

Wilbur WannaCry: Captured Cyber-villain or Has He Broken Free?

I was talking with my friend Gary Berman, aka “Cyber Hero”, you know – the man behind the curtain at the wildly popular CyberHero Adventures comics?  We were discussing one […]

Posted in Cyber Security News | Comments Off on Wilbur WannaCry: Captured Cyber-villain or Has He Broken Free?

Role based access control and best implementation practices

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc A role is a collection of permissions, and users receive permissions through the roles they have been assigned. Role Based Access […]

Posted in Cyber Security News | Comments Off on Role based access control and best implementation practices

Service account management (SAM) challenges and best practices

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc Introduction This article focuses more on the real-world challenges and which best practices should be adapted to overcome those challenges in […]

Posted in Cyber Security News | Comments Off on Service account management (SAM) challenges and best practices

How do we get privacy?

Revisiting the Basics and Importance of Cryptography by Joe Guerra, Cybersecurity Instructor, Hallmark University Since the onset of technology in society, it has broken the levees of data and has […]

Posted in Cyber Security News | Comments Off on How do we get privacy?

Experts uncovered a malspam campaign using Boeing 737 Max crash

Experts at the 360 Threat Intelligence Center uncovered a new malspam campaign that leverages the tragic Boeing 737 Max crash to spread malware. Crooks always attempt to exploit the attention […]

Posted in Cyber Security News | Comments Off on Experts uncovered a malspam campaign using Boeing 737 Max crash

Cyber security as a mandatory rule in this Era

A cyber vision to cyber success. by Pedro Tavares, Founder at CSIRT.UBI & seguranca-informatica.pt Cybersecurity attacks and data breaches have been making headlines recently. Do you think that cybersecurity represents […]

Posted in Cyber Security News | Comments Off on Cyber security as a mandatory rule in this Era

What recent industry data leaks tell us about CYBER-SECURITY

by Mark Wah, Principal Product Manager at Citrix  The cat and mouse game of hackers chasing data and organizations working to secure their customers’ personal information continues, requiring security teams […]

Posted in Cyber Security News | Comments Off on What recent industry data leaks tell us about CYBER-SECURITY

How to keep your home devices from being compromised

by Anthony, Founder at EquipmentArea.com There are now a lot of home device trends on how one can improve one’s home and make it more convenient and accessible. With the […]

Posted in Cyber Security News | Comments Off on How to keep your home devices from being compromised

Why You Don’t Need (or Want) a SIEM Tool

There are a lot of things that sound good on paper, but don’t work out as planned in practice: Hot dog buns that are sliced on the top, being a […]

Posted in Cyber Security News | Comments Off on Why You Don’t Need (or Want) a SIEM Tool

Recently fixed WinRAR bug actively exploited in the wild

Several threat actors are still exploiting a recently patched critical vulnerability in the popular compression software WinRAR. Several threat actors are actively exploiting a critical remote code execution vulnerability recently […]

Posted in Cyber Security News | Comments Off on Recently fixed WinRAR bug actively exploited in the wild

What CISOs really want

The Top 3 Things They Want You To Know by Josh Fu, Principal Security Engineer, Cylance Living in Minneapolis is ‘pretty excellent’. Yes, it’s winter eight months out of the […]

Posted in Cyber Security News | Comments Off on What CISOs really want

Cyber security in the era of Agile software development – Part 1

by Ivan De Los Santos Organizations of all sizes are adopting agile software techniques in order to better cope with changing requirements and the need to deliver value fast. In […]

Posted in Cyber Security News | Comments Off on Cyber security in the era of Agile software development – Part 1

Think like a hacker! and other tips to make you cyber resilient

by Arik Liberzon, Founder of Pcysys Think like a hacker. It seems so obvious but you might be surprised to hear that most cybersecurity professionals were taught to think about […]

Posted in Cyber Security News | Comments Off on Think like a hacker! and other tips to make you cyber resilient

Breaking down barriers to effective security with user and entity behavior analytics

by Orion Cassetto, senior director of Product Marketing at Exabeam The global cyber threat landscape is growing and evolving all the time – but fortunately, so are the technology solutions […]

Posted in Cyber Security News | Comments Off on Breaking down barriers to effective security with user and entity behavior analytics

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X