Monthly Archives: April 2019
The perfect storm driving the growth of ransomware
By Antonio Challita, Director of Product Management at cybersight Ransomware is an increasingly growing cybersecurity threat. This variation of malware allows an attacker to take control of devices, such as personal […]
Cyber hygiene is everyone’s job
Essentials practices By Pedro Tavares, Co-Founder, CSIRT.UBI With the Internet becoming a giant data container, cybersecurity challenges have increased both in number and complexity over the last years. Organization’s cybersecurity […]
Four hidden costs and cyber security risks of sudo
By Morey Haber, chief technology officer, beyondtrust It is always a philosophical debate as to whether to use open source software in a regulated environment. In the case of ‘sudo’—a […]
These hackers have breached FBI-affiliated websites and leaked data online
Media outlet Techcrunch reported that a hacker group has breached several FBI-affiliated websites and leaked the stolen info online. A hacker group claims to have hacked dozens of websites affiliated […]
Network Traffic Analysis (NTA)
Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of security solutions that use network communications as the foundational data source for detecting and […]
Limiting the impact of brute force attacks against your WordPress site
Brute force attacks against WordPress are disruptive even if you use secure passwords and two-factor authentication. Here’s how you can stop them in their tracks. By Graeme Caldwell, writer, Nexcess […]
Comparing cyber insurance policies
By Rickard Jorgensen, FCII, ARM, aciarb Cyber coverage is a growing area of business for the insurance industry. Originally the market for this coverage was limited to a handful of […]
How to be intelligent about threat intelligence
By Alexandre François, Senior Content Manager, Threat Intelligence Platform Planning and executing cyber attacks is no longer the job of one or few individuals. Organized groups are increasingly responsible for […]
Is the security of block-chain an advantage for online businesses?
By Oleh Koropenko When it comes to creating an impact, no Fintech has made quite as much of a splash in the last few years as blockchain. The Bitcoin blockchain […]
Shine a light on app security
By Min Pyo Hong, CEO, and Founder, SEWORKS Cybersecurity and protecting the network reside squarely in the corporate IT spotlight, yet there’s a shadow area where it’s time to shine […]
Rampart de troika: a three-step process to overcome cyber security’s top threat
By Daniel Jetton, Vice President of Cyber Services, obxtek The weakest link in most network security is human; however, recent research has determined an effective, three-part process to mitigate the […]
The impact of usability on phishing: prevention effectiveness
The phishing threat By Andrew B. Goldberg, Chief Scientist, Inky Phish Fence Phishing emails can take many forms; from massive email, blasts valuing quantity over quality, to spear phishing and […]
Why regular testing is important for GDPR compliance
Peter Bassill, CEO of Hedgehog Security, discusses one-way organizations can properly protect the data they store while also meeting new GDPR compliance rules By Peter Bassill, CEO, Hedgehog Cyber Security […]
The next generation of cyber-AI defense and the emerging AI-driven IOT botnet crisis
By Doron Chema, CEO, and Co-Founder of L7 Defense Cyber attacks have entered a new age. Very advanced attacks coming from IOT botnets are leaving companies stumped as they just […]
There is no silver bullet for cyber security but unified defense is best approach for companies
By Mohammad Jamal Tabbara, Senior Systems Engineer – UAE & Channel at Infoblox Enterprises of all sizes are falling victim to very determined malicious actors whose motivations range from financial […]
Traditional security defenses may prove Inadequate for effective GDPR strategies, warns Aruba
By Morten Illum, VP EMEA at Aruba Companies risk falling foul of incoming GDPR regulations by relying on existing, piecemeal security measures, according to a new whitepaper published today by […]
Minnesota Department of Human Services suffered a security breach
Minnesota Department of Human Services announced to have suffered a data breach that may have exposed the personal information of about 11,000 people. Minnesota Department of Human Services suffered a […]
Cyber defense is all about the offense
The Key to Cyber Security Lies in Preparation and Prevention By Kayla Elliott, PR & Marketing Manager, PC Matic Pro Best practices. Every organization has them, right? What employees should […]
Project Beresheet: Unhackable Lunar Module About To Land on Moon
At 3:25pm ET, Project “Beresheet” is about to land on the Moon. After many years of planning and preparation, Israel has stepped up to the plate to be the first […]
Sophisticated TajMahal APT Framework remained under the radar for 5 years
Cybersecurity experts at Kaspersky Lab uncovered a highly sophisticated spyware framework dubbed TajMahal that was involved in cyberespionage campaign for at least last 5 years. Cybersecurity researchers at Kaspersky discovered […]
How GDPR costs could widen the gap between small and large businesses
Will the gaps widen further between small and large firms by Reza Moaiandin, Founder, Cyber Scanner In every line of business, there are always factors that can make breaking through […]
Operation eligible receiver – the birthplace of cyber security: configurations
By Josh Paape More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver The purpose of the exercise was to test the response capabilities of critical […]
The art of phishing and how to fight it
The most dangerous attack vector in modern days By Pedro Tavares, CSIRT.UBI Co-Founder Cybercriminals continue using phishing attacks as an effective “cyber weapon”. Of all attack vectors, this remains as […]
Experts spotted the iOS version of the Exodus surveillance app
In the last weeks, a new Android surveillance malware dubbed Exodus made the headlines, now expert found the iOS version of the government spyware. Security experts at LookOut have discovered […]
Practices in network security monitoring
Update your deployment considerations By Joe Guerra, Cybersecurity Instructor, Hallmark University In the past decade, Cybersecurity departments have been tasked with applying solutions to answer the question: How to protect […]
The power of cloud technology: fighting cyber attacks
By Ryan Eisenacher, CMM, filmtrack The media and entertainment industry is no stranger to cyber attacks. It started with the Sony Pictures Entertainment breach in 2014 where 40 gigabytes of […]
Security risks of the instant gratification culture
By Javvad Malik, security advocate, alienvault Gone are the days where one would write a letter, post it, and wait a couple of days for it to be delivered. These […]
Free SFTP Software vs. Enterprise-Level SFTP Software: Which Should You Use?
The adage “There’s no such thing as a free lunch” exists for a reason. When it comes to exchanging sensitive files with your trading partners, free software or PC tools […]
Software, hardware and procedural compliance
By Milica D. Djekic The good software and hardware configuration, as well as the adequately written procedures and policies, are crucially important for the cyber defense of any IT infrastructure. […]
How automation can ensure speedy, successful PAM deployment
By Cameron Williams In today’s operating environments, where threats are increasing in volume and sophistication daily, security and IT leaders are forced to balance protecting an organization’s critical data to […]