Monthly Archives: April 2019

Protect your business with layers of defense

Defending your network from malicious attacks takes more Then a platform’s native security features By Troy Gill,…

5 things everyone needs to know about cyber security

Practical ways to prevent a cyber-attack By Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of…

On the clock

Why time is crucial in security execution By Brad O’Hearne DISCLAIMER: As with all security operations, always…

Magecart skimmer scripts hosted on GitHub infected 200+ e-commerce sites

Security experts discovered hosted on GitHub the skimmer scripts used by Magecart cybercrime gang to compromised Magento…

Local and state govt. Offices easy pickings for hackers

By Aviv Grafi, CEO of Votiro Perennially strapped for cash, understaffed and underfunded, local and even state…

OilRig APT uses Karkoff malware along with DNSpionage in recent attacks

Iran-linked OilRig cyberespionage group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns.Iran-linked OilRig…

Ensuring SSH Key Management Security

By Thomas macisaac, cybersecurity strategist, SSH Communications Security When it comes to SSH (Secure Shell) access management,…

Know your data

Improving business cyber defense                          …

Information security advice for small medium business

By François Amigorena Information security continues to challenge small and medium business  (SMB). According to the 2017…

How to spot fake news?

By Dan Brahmy, Founder, and CEO of Cyabra About a decade ago, there was a widespread tendency…

Show Buttons
Hide Buttons