Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

How to Avoid Spam Texts and Protect Personal Information in the Digital Age

With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on How to Avoid Spam Texts and Protect Personal Information in the Digital Age

Combatting Industry Burnout by Building Resilient Security Teams

By Rick McElroy, Principal Cybersecurity Strategist, VMware We have reached a pivotal point in the history of cybersecurity. Catalyzed by the shift to an anywhere-work environment during COVID-19, attack surfaces […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Combatting Industry Burnout by Building Resilient Security Teams

REvil ransomware gang demands $70M for universal decryptor for Kaseya victims

REvil ransomware is demanding $70 million for decrypting all systems locked during the Kaseya supply-chain ransomware attack. REvil ransomware is asking $70 million worth of Bitcoin for decrypting all systems […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on REvil ransomware gang demands $70M for universal decryptor for Kaseya victims

Rise of BYOD Once Again

By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Rise of BYOD Once Again

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , | Comments Off on SOCs to Turn to Security Automation to Cope with Growing Threats

Are Encrypted Communication Apps used for Crime Operations?

By Nicole Allen, Marketing Executive,  SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the dark web – but it’s pushing criminals into using encrypted apps which […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Are Encrypted Communication Apps used for Crime Operations?

Industry 4.0 under Threat Landscape

By Milica D. Djekic New tendencies in the technological landscape have brought new challenges in safety and security terms. It appears that industry 4.0 is more than ever under the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Industry 4.0 under Threat Landscape

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X