News

Cloud Direct Connects: The Best Bet for Cyber Security

by Tim Fogarty, Director of Enterprise, Shamrock Consulting Group If you are a member of corporate IT…

Synthetic identity fraud and social engineering are growing concerns and on the rise

by Christina Luttrell With the customer, not present identity fraud becoming an increasingly prevalent issue, major shifts…

CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats

by Liviu Arsene, Global Cybersecurity Analyst, Bitdefender In a fast-changing landscape where large cyber attacks make the…

Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS flaw allowing WannaCry-Like…

The Attribution Problem – Using PAI to Improve Actor Attribution

By Brian Pate, SVP, Babel Street Within the cyber community, conventional wisdom is that malicious actors can…

Why CIOs/CISO’s Positions Are Becoming More Challenging

By Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company It’s your worst…

The Hottest Career on the Block

By Nick Galov Our world is changing fast. Thirty years ago, you left school, choose a potential…

The Critical Role TAPs Play in Network Security and Resiliency

By Alastair Hartrup, CEO, Network Critical Networks continue to be under persistent attack. As a matter of…

WhatsApp zero-day exploited in targeted attacks to deliver NSO spyware

Facebook fixed a critical zero-day flaw in WhatsApp that has been exploited to remotely install spyware on…

Is Your Encryption Flexible Enough?

Introducing the XOTIC™ Crypto System By Richard Blech, CEO, Secure Channels Inc. Introduction The science of modern…

Show Buttons
Hide Buttons