3 Cybersecurity Certainties for 2022

By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on 3 Cybersecurity Certainties for 2022

Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Contactless Passwordless Auto Login

with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, CEO of Freemindtronic On a daily basis, every company, regardless of its […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Contactless Passwordless Auto Login

Executive Protection Needs to Include Digital

By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks and dangers inherent to their executives’ security. Executive Protection is an established […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Executive Protection Needs to Include Digital

The Case for Open XDR

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on The Case for Open XDR

Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

Rise of BYOD Once Again

By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Rise of BYOD Once Again

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X