Monthly Archives: April 2019

Protect your business with layers of defense

Defending your network from malicious attacks takes more Then a platform’s native security features By Troy Gill, Senior Security Analyst, AppRiver Businesses flock to the cloud. As they do, they […]

Posted in Cyber Security News | Comments Off on Protect your business with layers of defense

5 things everyone needs to know about cyber security

Practical ways to prevent a cyber-attack By Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of when you hear the word “cybersecurity”? For some, just the name sounds ominous […]

Posted in Cyber Security News | Comments Off on 5 things everyone needs to know about cyber security

On the clock

Why time is crucial in security execution By Brad O’Hearne DISCLAIMER: As with all security operations, always act in accordance with the highest standard of legality and ethics, making sure […]

Posted in Cyber Security News | Comments Off on On the clock

Magecart skimmer scripts hosted on GitHub infected 200+ e-commerce sites

Security experts discovered hosted on GitHub the skimmer scripts used by Magecart cybercrime gang to compromised Magento installations worldwide. Experts discovered the Magecart skimmer scripts used to compromise a few […]

Posted in Cyber Security News | Comments Off on Magecart skimmer scripts hosted on GitHub infected 200+ e-commerce sites

Local and state govt. Offices easy pickings for hackers

By Aviv Grafi, CEO of Votiro Perennially strapped for cash, understaffed and underfunded, local and even state government offices in the United States are sitting ducks for cyber-attacks. While not […]

Posted in Cyber Security News | Comments Off on Local and state govt. Offices easy pickings for hackers

OilRig APT uses Karkoff malware along with DNSpionage in recent attacks

Iran-linked OilRig cyberespionage group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns.Iran-linked OilRig cyberespione group is using the reconnaissance malware Karkoff along with DNSpionage in recent […]

Posted in Cyber Security News | Comments Off on OilRig APT uses Karkoff malware along with DNSpionage in recent attacks

Ensuring SSH Key Management Security

By Thomas macisaac, cybersecurity strategist, SSH Communications Security When it comes to SSH (Secure Shell) access management, ignorance is anything but bliss. What you don’t know can seriously hurt your […]

Posted in Cyber Security News | Comments Off on Ensuring SSH Key Management Security

Know your data

Improving business cyber defense                                                     […]

Posted in Cyber Security News | Comments Off on Know your data

Information security advice for small medium business

By François Amigorena Information security continues to challenge small and medium business  (SMB). According to the 2017 Ponemon Institute Study, more than 61% of smbs have been breached in the […]

Posted in Cyber Security News | Comments Off on Information security advice for small medium business

How to spot fake news?

By Dan Brahmy, Founder, and CEO of Cyabra About a decade ago, there was a widespread tendency to see the internet as a new arena for the democratization of public […]

Posted in Cyber Security News | Comments Off on How to spot fake news?

Cyber security good practices

By Milica D. Djekic The cyber defense is the area of technology where you need to deal with the high-tech risk. It would usually get correlated with the possibility for […]

Posted in Cyber Security News | Comments Off on Cyber security good practices

How tech-giants like Facebook and whats-app are affected by gdpr

By Greg Sparrow, Senior Vice President & General Manager, compliance point The General  Data Protection Regulation (“GDPR”) is currently one of the most important topics of conversation for U.S.  companies.  […]

Posted in Cyber Security News | Comments Off on How tech-giants like Facebook and whats-app are affected by gdpr

Cyber security mistakes that marketing managers usually make

By Veronika Duzhan, keepsolid Inc Any business’ success is built upon the hard work of every department. However, in the age of cyber threats, simple security mistakes of one staff […]

Posted in Cyber Security News | Comments Off on Cyber security mistakes that marketing managers usually make

The phishing as a never ending challenge of today

By Milica D. Djekic When we say the phishing, we would first think about some suspicious e-mail getting the malicious link with so. The experience would show that there are […]

Posted in Cyber Security News | Comments Off on The phishing as a never ending challenge of today

Insider’s threats vs. Access management

By Milica D. Djekic The insider’s threats are a quite big security challenge of today. The best way to protect ourselves from a threat is to understand so. In other […]

Posted in Cyber Security News | Comments Off on Insider’s threats vs. Access management

Cyber hygiene is everyone’s job

Essentials practices By Pedro Tavares, Co-Founder, CSIRT.UBI With the Internet becoming a giant data container, cybersecurity challenges have increased both in number and complexity over the last years. Organization’s cybersecurity […]

Posted in Cyber Security News | Comments Off on Cyber hygiene is everyone’s job

Choosing the right encrypted USB flash drive for your needs

By Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology With all of the hacking, breaching, stealing, and compromising of personal data going on in the world, there are probably […]

Posted in Cyber Security News | Comments Off on Choosing the right encrypted USB flash drive for your needs

Bodybuilding.com forces password reset after a security breach

Bad news for fitness and bodybuilding passionates, the popular online retailer Bodybuilding.com announced that hackers have broken into its systems. The popular online retailer website Bodybuilding.com announced last week that […]

Posted in Cyber Security News | Comments Off on Bodybuilding.com forces password reset after a security breach

The perfect storm driving the growth of ransomware

By Antonio Challita, Director of Product Management at cybersight Ransomware is an increasingly growing cybersecurity threat. This variation of malware allows an attacker to take control of devices,  such as […]

Posted in Cyber Security News | Comments Off on The perfect storm driving the growth of ransomware

Filling the Public Relations Void for Security Innovators

Exclusive Interview with Dan Chmielewski, agency principal, Madison Alexander PR, Inc., an InfoSec Focused High Tech Communications Agency, by Gary S. Miliefsky, Publisher, Cyber Defense Magazine When it comes to […]

Posted in Cyber Security News | Comments Off on Filling the Public Relations Void for Security Innovators

How consistent security reporting in government could prevent the next wannacry exploit

By Robert Schofield, Senior Solutions Architect, netcentrics and Thomas Cook, Senior Systems Engineer, netcentrics Nearly one year ago, wannacry emerged as one of the most prolific and disruptive cyber attacks […]

Posted in Cyber Security News | Comments Off on How consistent security reporting in government could prevent the next wannacry exploit

Phoebe the Phisher: Will this Cyber-villain Ever be Captured?

While researching for this article about Gary Berman’s wildly popular comic series, The CyberHero Adventures: Defenders of the Digital Universe, I came across a villain that is all-too-familiar to me… […]

Posted in Cyber Security News | Comments Off on Phoebe the Phisher: Will this Cyber-villain Ever be Captured?

Security Product Spotlight: Aegis Fortress L3

I was invited by Apricorn to test their Aegis Fortress L3 – USB 3.1 / 3.2 Portable Drive.  If you know me by now, I am a huge proponent of […]

Posted in Cyber Security News | Comments Off on Security Product Spotlight: Aegis Fortress L3

Digital Transformation Speaker Series Coming to New Hampshire

Will you be in the New Hampshire area on May 2, 2019? You’re Invited Join us for a Digital Transformation Speaker Series with cocktails and delicious appetizers and desserts at […]

Posted in Cyber Security News | Comments Off on Digital Transformation Speaker Series Coming to New Hampshire

Third Party – Minimizing Organizational Exposure by Mitigating the Wild Card in Security Strategies

2019 Shared Assessments Third Party Risk Management Toolkit Helps Organizations Replace FUD with Actionable Insight, Risk Management Best Practices, and Invaluable Tools. by Catherine A. Allen, Chairman, and CEO The […]

Posted in Cyber Security News | Comments Off on Third Party – Minimizing Organizational Exposure by Mitigating the Wild Card in Security Strategies

Russian Twitter bot activity increased in the wake Mueller report release

Experts at security firm SafeGuard reported that Russian Twitter bot activity raised up by 286 percent in the wake of the release of the Mueller Report.  Social media platforms like […]

Posted in Cyber Security News | Tagged , , , | Comments Off on Russian Twitter bot activity increased in the wake Mueller report release

Defense by offense

Purple Team: The Meeting Point of Red and Blue Teams Meet by Maya Schirmann, VP Marketing, XM Cyber “If you know the enemy and know yourself, you need not to […]

Posted in Cyber Security News | Comments Off on Defense by offense

Aligning Cyber security Effectiveness with Core Business Objectives

Cybersecurity programs establish defined goals but lack measurable indicators to gauge effectiveness. by Brian Contos, CISO, Verodin Inc. From an objective perspective, it is easy to become desensitized by the […]

Posted in Cyber Security News | Comments Off on Aligning Cyber security Effectiveness with Core Business Objectives

Marcus Hutchins pleads guilty to two counts of banking malware creation

British malware researcher Marcus Hutchins has pleaded guilty to developing and sharing the banking malware between July 2014 and July 2015. The popular British cybersecurity expert Marcus Hutchins has pleaded […]

Posted in Cyber Security News | Comments Off on Marcus Hutchins pleads guilty to two counts of banking malware creation

Quis custodiet ipsos custodes?

Who watches the watchers? By Dr. Richard Ford, Chief Scientist, Forcepoint Over the last few years, I think every CISO has become painfully aware of the so-called “insider threat” – […]

Posted in Cyber Security News | Comments Off on Quis custodiet ipsos custodes?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X