Monthly Archives: April 2019

The perfect storm driving the growth of ransomware

By Antonio Challita, Director of Product Management at cybersight Ransomware is an increasingly growing cybersecurity threat. This variation of malware allows an attacker to take control of devices,  such as personal […]

Posted in Cyber Security News | Comments Off on The perfect storm driving the growth of ransomware

Cyber hygiene is everyone’s job

Essentials practices By Pedro Tavares, Co-Founder, CSIRT.UBI With the Internet becoming a giant data container, cybersecurity challenges have increased both in number and complexity over the last years. Organization’s cybersecurity […]

Posted in Cyber Security News | Comments Off on Cyber hygiene is everyone’s job

Four hidden costs and cyber security risks of sudo

By Morey Haber, chief technology officer, beyondtrust It is always a philosophical debate as to whether to use open source software in a regulated environment. In the case of ‘sudo’—a […]

Posted in Cyber Security News | Comments Off on Four hidden costs and cyber security risks of sudo

These hackers have breached FBI-affiliated websites and leaked data online

Media outlet Techcrunch reported that a hacker group has breached several FBI-affiliated websites and leaked the stolen info online. A hacker group claims to have hacked dozens of websites affiliated […]

Posted in Cyber Security News | Comments Off on These hackers have breached FBI-affiliated websites and leaked data online

Network Traffic Analysis (NTA)

Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of security solutions that use network communications as the foundational data source for detecting and […]

Posted in Cyber Security News | Comments Off on Network Traffic Analysis (NTA)

Limiting the impact of brute force attacks against your WordPress site

Brute force attacks against WordPress are disruptive even if you use secure passwords and two-factor authentication. Here’s how you can stop them in their tracks. By Graeme Caldwell, writer, Nexcess […]

Posted in Cyber Security News | Comments Off on Limiting the impact of brute force attacks against your WordPress site

Comparing cyber insurance policies

By Rickard Jorgensen, FCII, ARM, aciarb Cyber coverage is a growing area of business for the insurance industry. Originally the market for this coverage was limited to a handful of […]

Posted in Cyber Security News | Comments Off on Comparing cyber insurance policies

How to be intelligent about threat intelligence

By Alexandre François, Senior Content Manager, Threat Intelligence Platform Planning and executing cyber attacks is no longer the job of one or few individuals. Organized groups are increasingly responsible for […]

Posted in Cyber Security News | Comments Off on How to be intelligent about threat intelligence

Is the security of block-chain an advantage for online businesses?

By Oleh Koropenko When it comes to creating an impact, no Fintech has made quite as much of a splash in the last few years as blockchain. The  Bitcoin blockchain […]

Posted in Cyber Security News | Comments Off on Is the security of block-chain an advantage for online businesses?

Shine a light on app security

By Min Pyo Hong, CEO, and Founder, SEWORKS Cybersecurity and protecting the network reside squarely in the corporate IT  spotlight,  yet there’s a shadow area where it’s time to shine […]

Posted in Cyber Security News | Comments Off on Shine a light on app security

Rampart de troika: a three-step process to overcome cyber security’s top threat

By Daniel Jetton, Vice President of Cyber Services, obxtek The weakest link in most network security is human; however, recent research has determined an effective, three-part process to mitigate the […]

Posted in Cyber Security News | Comments Off on Rampart de troika: a three-step process to overcome cyber security’s top threat

The impact of usability on phishing: prevention effectiveness

The phishing threat By Andrew B. Goldberg, Chief Scientist, Inky Phish Fence  Phishing emails can take many forms; from massive email, blasts valuing quantity over quality, to spear phishing and […]

Posted in Cyber Security News | Comments Off on The impact of usability on phishing: prevention effectiveness

Why regular testing is important for GDPR compliance

Peter Bassill, CEO of Hedgehog Security, discusses one-way organizations can properly protect the data they store while also meeting new GDPR compliance rules By Peter Bassill, CEO, Hedgehog Cyber Security […]

Posted in Cyber Security News | Comments Off on Why regular testing is important for GDPR compliance

The next generation of cyber-AI defense and the emerging AI-driven IOT botnet crisis

By Doron Chema, CEO, and Co-Founder of L7 Defense Cyber attacks have entered a new age. Very advanced attacks coming from IOT botnets are leaving companies stumped as they just […]

Posted in Cyber Security News | Comments Off on The next generation of cyber-AI defense and the emerging AI-driven IOT botnet crisis

There is no silver bullet for cyber security but unified defense is best approach for companies

By Mohammad Jamal Tabbara, Senior Systems Engineer – UAE & Channel at Infoblox Enterprises of all sizes are falling victim to very determined malicious actors whose motivations range from financial […]

Posted in Cyber Security News | Comments Off on There is no silver bullet for cyber security but unified defense is best approach for companies

Traditional security defenses may prove Inadequate for effective GDPR strategies, warns Aruba

By Morten Illum, VP EMEA at Aruba Companies risk falling foul of incoming GDPR regulations by relying on existing, piecemeal security measures, according to a new whitepaper published today by […]

Posted in Cyber Security News | Comments Off on Traditional security defenses may prove Inadequate for effective GDPR strategies, warns Aruba

Minnesota Department of Human Services suffered a security breach

Minnesota Department of Human Services announced to have suffered a data breach that may have exposed the personal information of about 11,000 people. Minnesota Department of Human Services suffered a […]

Posted in Cyber Security News | Comments Off on Minnesota Department of Human Services suffered a security breach

Cyber defense is all about the offense

The Key to Cyber Security Lies in Preparation and Prevention  By Kayla Elliott, PR & Marketing Manager, PC Matic Pro Best practices.  Every organization has them, right?  What employees should […]

Posted in Cyber Security News | Comments Off on Cyber defense is all about the offense

Project Beresheet: Unhackable Lunar Module About To Land on Moon

At 3:25pm ET, Project “Beresheet” is about to land on the Moon.  After many years of planning and preparation, Israel has stepped up to the plate to be the first […]

Posted in Cyber Security News | Comments Off on Project Beresheet: Unhackable Lunar Module About To Land on Moon

Sophisticated TajMahal APT Framework remained under the radar for 5 years

Cybersecurity experts at Kaspersky Lab uncovered a highly sophisticated spyware framework dubbed TajMahal that was involved in cyberespionage campaign for at least last 5 years. Cybersecurity researchers at Kaspersky discovered […]

Posted in Cyber Security News | Comments Off on Sophisticated TajMahal APT Framework remained under the radar for 5 years

How GDPR costs could widen the gap between small and large businesses

Will the gaps widen further between small and large firms by Reza Moaiandin, Founder, Cyber Scanner In every line of business, there are always factors that can make breaking through […]

Posted in Cyber Security News | Comments Off on How GDPR costs could widen the gap between small and large businesses

Operation eligible receiver – the birthplace of cyber security: configurations

By Josh Paape More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver The purpose of the exercise was to test the response capabilities of critical […]

Posted in Cyber Security News | Comments Off on Operation eligible receiver – the birthplace of cyber security: configurations

The art of phishing and how to fight it

The most dangerous attack vector in modern days By Pedro Tavares, CSIRT.UBI Co-Founder Cybercriminals continue using phishing attacks as an effective “cyber weapon”. Of all attack vectors, this remains as […]

Posted in Cyber Security News | Comments Off on The art of phishing and how to fight it

Experts spotted the iOS version of the Exodus surveillance app

In the last weeks, a new Android surveillance malware dubbed Exodus made the headlines, now expert found the iOS version of the government spyware. Security experts at LookOut have discovered […]

Posted in Cyber Security News | Comments Off on Experts spotted the iOS version of the Exodus surveillance app

Practices in network security monitoring

Update your deployment considerations By Joe Guerra, Cybersecurity Instructor, Hallmark University In the past decade, Cybersecurity departments have been tasked with applying solutions  to answer the question: How to protect […]

Posted in Cyber Security News | Comments Off on Practices in network security monitoring

The power of cloud technology: fighting cyber attacks

By Ryan Eisenacher, CMM, filmtrack The media and entertainment industry is no stranger to cyber attacks. It started with the Sony Pictures Entertainment breach in 2014 where 40 gigabytes of […]

Posted in Cyber Security News | Comments Off on The power of cloud technology: fighting cyber attacks

Security risks of the instant gratification culture

By Javvad Malik, security advocate, alienvault Gone are the days where one would write a letter, post it, and wait a couple of days for it to be delivered. These […]

Posted in Cyber Security News | Comments Off on Security risks of the instant gratification culture

Free SFTP Software vs. Enterprise-Level SFTP Software: Which Should You Use?

The adage “There’s no such thing as a free lunch” exists for a reason. When it comes to exchanging sensitive files with your trading partners, free software or PC tools […]

Posted in Cyber Security News | Comments Off on Free SFTP Software vs. Enterprise-Level SFTP Software: Which Should You Use?

Software, hardware and procedural compliance

By Milica D. Djekic The good software and hardware configuration, as well as the adequately written procedures and policies, are crucially important for the cyber defense of any IT infrastructure. […]

Posted in Cyber Security News | Comments Off on Software, hardware and procedural compliance

How automation can ensure speedy, successful PAM deployment

By Cameron Williams In today’s operating environments, where threats are increasing in volume and sophistication daily, security and IT leaders are forced to balance protecting an organization’s critical data to […]

Posted in Cyber Security News | Comments Off on How automation can ensure speedy, successful PAM deployment

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X