Friday, September 25, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST

Privacy Shield Revoked

What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits TechnologiesOn July 16th, the European Court of Justice (ECJ) struck...

Manual vs. Automatic Cybersecurity Testing: What’s the Difference?

By Tamir Shriki, Customer Operations Manager, XM CyberIn the context of cybersecurity, if you want to protect something, you need the ability to test...

German investigators blame Russian DoppelPaymer gang for deadly hospital attack

The investigation of German authorities on the recent attack on the Dusseldorf hospital reveals the possible involvement of Russian hackers.Last week, German authorities revealed...

5 Ways to Avoid Security Automation Pitfalls

By Joe Partlow, CTO at ReliaQuestAmid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to...

Mozi Botnet is responsible for most of the IoT Traffic

The Mozi botnet accounted for 90% of the IoT network traffic observed between October 2019 and June 2020, IBM reported.Mozi is an IoT botnet...

Weaknesses of Biometric Authentication

By Mark Perkins, MS, CISSP, IT ManagerIn today’s digital world, knowing who is on the other end of the wire is more important than...

Cyber Defense TV

cyberdefensetv.com

Cyber Defense Radio

cyberdefenseradio.com

Cyber Defense Webinars

cyberdefensewebinars.com

Cyber Security News

Media Content Captured on Mobile Is Driving Compliance Problems

Media Content Captured on Mobile Is Driving Compliance Problems

0
Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, InkscreenRecent headlines are once again demonstrating the consequences of employees' inappropriate leaking photos from mobile devices, and are shedding new light...
Funding Schemes and Cyber Security

Funding Schemes and Cyber Security

0
By Milica D. DjekicWhat a lovely day; you are just searching your web for some online business opportunities or you are reviewing the cyberspace to get the stipend for your student’s service. Here we go! The option simply appeared...
How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters

How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software...

0
By Don Boxley, co-founder, and CEO, DH2iCybersecurity researchers at the independent security research group JSOF recently discovered at least 19 security vulnerabilities that are found at the base of almost all Internet of Things (IoT) products. The zero-day...
Building Secure Software Right From the Start Four Steps for an Effective AppSec Strategy

Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

0
By Joanne Godfrey, Security Evangelist, ZeroNorthCompanies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But one false move, such as releasing vulnerability-riddled software that facilitates...

Secure Revenue Success with a Better User Experience (UX)

0
Join us for a live webinar - A Before and After Success Story on How One Cyber Security Company Addressed UX to Increase Product Adoption and Generate Revenue - Thursday, September 25, 2020 at noon. In early 2020, Hypori had...
Do Not Forget to Securely Lock Your Data in Microsoft Teams

Do Not Forget to Securely Lock Your Data in Microsoft Teams

0
By Johanna Reisacher, Marketing Manager, Secomba GmbHMore and more employees work from home. As a result, in the last months the demand for Microsoft products, especially Microsoft Teams, has increased. Therefore, in many companies and organizations, a large amount...

Zerologon attack lets hackers to completely compromise a Windows domain

0
Zerologon attack allows threat actors to take over enterprise networks by exploiting the CVE-2020-1472 patched in the August 2020 Patch Tuesday.Administrators of enterprise Windows Servers have to install the August 2020 Patch Tuesday as soon as possible to protect their...
Navigating Remote Work and Security in the COVID-19 Era

The “New Normal” – Navigating Remote Work and Security in the COVID-19 Era

0
By Bill Delisi, CEO of GOFBAThere are many “new normal” that apply to different parts of life and certain industries. For cybersecurity, a core change to the landscape is the impacts of remote work and security issues both during...

STAY CONNECTED

35,232FansLike
55,610FollowersFollow