News

Best Practices to Minimize Negative Impact,Downtime After a Ransomware Infection

by Jim Varner, President, and CEO, SecurityFirst Ransomware has become a scourge to businesses around the globe…

Where do I “Sign”?

A short Review on Digital Signatures by Joe Guerra, Cybersecurity Instructor, Hallmark University The fundamentals of data…

EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

Europol announced the EU Law Enforcement Emergency Response Protocol new protocol for law enforcement agencies in the…

Wilbur WannaCry: Captured Cyber-villain or Has He Broken Free?

I was talking with my friend Gary Berman, aka “Cyber Hero”, you know – the man behind…

Role based access control and best implementation practices

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc A role is a collection of permissions, and…

Service account management (SAM) challenges and best practices

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc Introduction This article focuses more on the real-world…

How do we get privacy?

Revisiting the Basics and Importance of Cryptography by Joe Guerra, Cybersecurity Instructor, Hallmark University Since the onset…

Experts uncovered a malspam campaign using Boeing 737 Max crash

Experts at the 360 Threat Intelligence Center uncovered a new malspam campaign that leverages the tragic Boeing…

Cyber security as a mandatory rule in this Era

A cyber vision to cyber success. by Pedro Tavares, Founder at CSIRT.UBI & seguranca-informatica.pt Cybersecurity attacks and…

What recent industry data leaks tell us about CYBER-SECURITY

by Mark Wah, Principal Product Manager at Citrix  The cat and mouse game of hackers chasing data…

Show Buttons
Hide Buttons