Author Description

Author Posts

Taking the fight to the cyber criminals

Why organizations urgently need to outsource threat intelligence gathering As cybercrime itself matures into an industry with…

Inspiring Greater Accountability with Improved Security KPIs

By Lewie Dunsworth, EVP Technical Operations, Herjavec Group The good news is that the CEO and board…

The perfect storm driving the growth of ransomware

By Antonio Challita, Director of Product Management at cybersight Ransomware is an increasingly growing cybersecurity threat. This…

Cyber hygiene is everyone’s job

Essentials practices By Pedro Tavares, Co-Founder, CSIRT.UBI With the Internet becoming a giant data container, cybersecurity challenges…

Four hidden costs and cyber security risks of sudo

By Morey Haber, chief technology officer, beyondtrust It is always a philosophical debate as to whether to…

Limiting the impact of brute force attacks against your WordPress site

Brute force attacks against WordPress are disruptive even if you use secure passwords and two-factor authentication. Here’s…

Comparing cyber insurance policies

By Rickard Jorgensen, FCII, ARM, aciarb Cyber coverage is a growing area of business for the insurance…

How to be intelligent about threat intelligence

By Alexandre François, Senior Content Manager, Threat Intelligence Platform Planning and executing cyber attacks is no longer…

Is the security of block-chain an advantage for online businesses?

By Oleh Koropenko When it comes to creating an impact, no Fintech has made quite as much…

Shine a light on app security

By Min Pyo Hong, CEO, and Founder, SEWORKS Cybersecurity and protecting the network reside squarely in the…

Show Buttons
Hide Buttons