Monthly Archives: April 2019
Protect your business with layers of defense
Defending your network from malicious attacks takes more Then a platform’s native security features By Troy Gill, Senior Security Analyst, AppRiver Businesses flock to the cloud. As they do, they […]
5 things everyone needs to know about cyber security
Practical ways to prevent a cyber-attack By Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of when you hear the word “cybersecurity”? For some, just the name sounds ominous […]
On the clock
Why time is crucial in security execution By Brad O’Hearne DISCLAIMER: As with all security operations, always act in accordance with the highest standard of legality and ethics, making sure […]
Magecart skimmer scripts hosted on GitHub infected 200+ e-commerce sites
Security experts discovered hosted on GitHub the skimmer scripts used by Magecart cybercrime gang to compromised Magento installations worldwide. Experts discovered the Magecart skimmer scripts used to compromise a few […]
Local and state govt. Offices easy pickings for hackers
By Aviv Grafi, CEO of Votiro Perennially strapped for cash, understaffed and underfunded, local and even state government offices in the United States are sitting ducks for cyber-attacks. While not […]
OilRig APT uses Karkoff malware along with DNSpionage in recent attacks
Iran-linked OilRig cyberespionage group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns.Iran-linked OilRig cyberespione group is using the reconnaissance malware Karkoff along with DNSpionage in recent […]
Ensuring SSH Key Management Security
By Thomas macisaac, cybersecurity strategist, SSH Communications Security When it comes to SSH (Secure Shell) access management, ignorance is anything but bliss. What you don’t know can seriously hurt your […]
Know your data
Improving business cyber defense […]
Information security advice for small medium business
By François Amigorena Information security continues to challenge small and medium business (SMB). According to the 2017 Ponemon Institute Study, more than 61% of smbs have been breached in the […]
How to spot fake news?
By Dan Brahmy, Founder, and CEO of Cyabra About a decade ago, there was a widespread tendency to see the internet as a new arena for the democratization of public […]
Cyber security good practices
By Milica D. Djekic The cyber defense is the area of technology where you need to deal with the high-tech risk. It would usually get correlated with the possibility for […]
How tech-giants like Facebook and whats-app are affected by gdpr
By Greg Sparrow, Senior Vice President & General Manager, compliance point The General Data Protection Regulation (“GDPR”) is currently one of the most important topics of conversation for U.S. companies. […]
Cyber security mistakes that marketing managers usually make
By Veronika Duzhan, keepsolid Inc Any business’ success is built upon the hard work of every department. However, in the age of cyber threats, simple security mistakes of one staff […]
The phishing as a never ending challenge of today
By Milica D. Djekic When we say the phishing, we would first think about some suspicious e-mail getting the malicious link with so. The experience would show that there are […]
Insider’s threats vs. Access management
By Milica D. Djekic The insider’s threats are a quite big security challenge of today. The best way to protect ourselves from a threat is to understand so. In other […]
Cyber hygiene is everyone’s job
Essentials practices By Pedro Tavares, Co-Founder, CSIRT.UBI With the Internet becoming a giant data container, cybersecurity challenges have increased both in number and complexity over the last years. Organization’s cybersecurity […]
Choosing the right encrypted USB flash drive for your needs
By Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology With all of the hacking, breaching, stealing, and compromising of personal data going on in the world, there are probably […]
Bodybuilding.com forces password reset after a security breach
Bad news for fitness and bodybuilding passionates, the popular online retailer Bodybuilding.com announced that hackers have broken into its systems. The popular online retailer website Bodybuilding.com announced last week that […]
The perfect storm driving the growth of ransomware
By Antonio Challita, Director of Product Management at cybersight Ransomware is an increasingly growing cybersecurity threat. This variation of malware allows an attacker to take control of devices, such as […]
Filling the Public Relations Void for Security Innovators
Exclusive Interview with Dan Chmielewski, agency principal, Madison Alexander PR, Inc., an InfoSec Focused High Tech Communications Agency, by Gary S. Miliefsky, Publisher, Cyber Defense Magazine When it comes to […]
How consistent security reporting in government could prevent the next wannacry exploit
By Robert Schofield, Senior Solutions Architect, netcentrics and Thomas Cook, Senior Systems Engineer, netcentrics Nearly one year ago, wannacry emerged as one of the most prolific and disruptive cyber attacks […]
Phoebe the Phisher: Will this Cyber-villain Ever be Captured?
While researching for this article about Gary Berman’s wildly popular comic series, The CyberHero Adventures: Defenders of the Digital Universe, I came across a villain that is all-too-familiar to me… […]
Security Product Spotlight: Aegis Fortress L3
I was invited by Apricorn to test their Aegis Fortress L3 – USB 3.1 / 3.2 Portable Drive. If you know me by now, I am a huge proponent of […]
Digital Transformation Speaker Series Coming to New Hampshire
Will you be in the New Hampshire area on May 2, 2019? You’re Invited Join us for a Digital Transformation Speaker Series with cocktails and delicious appetizers and desserts at […]
Third Party – Minimizing Organizational Exposure by Mitigating the Wild Card in Security Strategies
2019 Shared Assessments Third Party Risk Management Toolkit Helps Organizations Replace FUD with Actionable Insight, Risk Management Best Practices, and Invaluable Tools. by Catherine A. Allen, Chairman, and CEO The […]
Russian Twitter bot activity increased in the wake Mueller report release
Experts at security firm SafeGuard reported that Russian Twitter bot activity raised up by 286 percent in the wake of the release of the Mueller Report. Social media platforms like […]
Defense by offense
Purple Team: The Meeting Point of Red and Blue Teams Meet by Maya Schirmann, VP Marketing, XM Cyber “If you know the enemy and know yourself, you need not to […]
Aligning Cyber security Effectiveness with Core Business Objectives
Cybersecurity programs establish defined goals but lack measurable indicators to gauge effectiveness. by Brian Contos, CISO, Verodin Inc. From an objective perspective, it is easy to become desensitized by the […]
Marcus Hutchins pleads guilty to two counts of banking malware creation
British malware researcher Marcus Hutchins has pleaded guilty to developing and sharing the banking malware between July 2014 and July 2015. The popular British cybersecurity expert Marcus Hutchins has pleaded […]
Quis custodiet ipsos custodes?
Who watches the watchers? By Dr. Richard Ford, Chief Scientist, Forcepoint Over the last few years, I think every CISO has become painfully aware of the so-called “insider threat” – […]