Monthly Archives: February 2019
Best Practices for Data Protection
By Eitan Bremler, Co-founder and VP of Product, Safe-T As more companies pursue digital transformation, they may also increase vulnerability to cyber-attacks. That is because the practice often includes cloud […]
The 5 Most Cringe-Worthy Privileged Data Breaches of 2018
By Morey J. Haber, Chief Technology Officer, Beyond Trust Privileged attack vectors and stolen personally identifiable information (PII) obtained have been a constantly paired news item throughout 2018. In 2019, […]
Mid-Market Businesses, Don’t Think Small about Security
By Jake Kiser, CEO, StrongKey Whether in business or cybersecurity, it doesn’t help small businesses to play small. When it comes to cybercrime, hackers don’t discriminate – they see small […]
Automated STIG “Hardening” Finally Comes to Government IT
For the thousands of hard-working men and women responsible for securing government IT networks to the Defense Information Systems Agency’s mandatory “STIG” standards, the task can be daunting and even […]
RSA Conference: $900 discount—last day for sweet deal!
Just like chocolate and flowers, our special Valentine’s Day discount is a limited-time treat. But one thing that lasts forever? All the valuable cybersecurity know-how you’ll gain when you attend […]
Bank of Valletta shut down its operations after a cyber attack
Bank of Valletta, the largest bank of Malta was hit by a cyber attack, attackers attempted to steal 13 million euros ($14.7 million). Bank of Valletta the largest bank in Malta […]
Shattered! Security in a Fragmented World of Workloads
by Satyam Tyagi, Director Product Management, ColorTokens Inc. Look at me, I’m in tatters! Don’t you know the crime rate is going up, up, up, up, up To live in […]
Phishing in the Dark: Employee Security Gaps Are Growing
By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing malware attachments or links to malicious sites. However, as email security solutions improve and phishing awareness […]
Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model
By Tae Jin “TJ” Kang, CEO, Insignary, Inc. As software becomes more sophisticated, organizations of all sizes continue to harness its capabilities to transform their go-to-market strategies and streamline their […]
CBS News Exclusive: Hackers are stealing millions of medical records – and selling them on the dark web
As health care providers store patients’ medical records digitally, some have left their files vulnerable to being exposed – and even sold on the black market, or the internet’s dark […]
Open-Source Code
Quick Review of the “Flat map-stream” attack THE SOCIAL ENGINEERING ATTACK Recently, a malicious attacker socially engineered a developer and had acquired legitimate access to a popular JavaScript library and […]
Want to Secure Your Endpoints? Go Beyond the Endpoint
by Jai Balasubramaniyan, Director of Product Management, ColorTokens Inc. Traditional endpoint security control has always been about malware, threat analysis, and remediation. However, it is useless for an endpoint to […]
MetaMask app on Google Play was a Clipboard Hijacker
Security researcher Lukas Stefanko from ESET discovered the first Android cryptocurrency clipboard hijacker impersonating MetaMask on the official Google Play store. The rogue MetaMask app is a Clipboard Hikacker that monitors a device’s clipboard for […]
QuadrigaCX Cryptocurrency Exchange — Password or Death Fail?
Special to Cyber Defense Magazine By Yan Ross News has been coming in this week with many conflicting viewpoints about the implications of the reported death of Gerald Cotten, Founder, […]
Thousands of RDM refrigeration systems exposed online are at risk
Experts from Safety Detective discovered thousands of refrigeration systems made by Resource Data Management (RDM) exposed to remote attacks. Thousands of instances of a temperature control system made by Resource Data […]
9 Ways to Safeguard Privileged User Accounts and Protect Your Business
By Anusha K. Muralidharan, Product Consultant, ManageEngine At Gartner’s Security and Risk Management Summit in June 2019, the top 10 security projects that chief information security officers (CISOs) should concentrate […]
The US Must Catch Up to Other Prominent Powers in Cyber-warfare Defense
By Bryan Becker, DAST Product Manager, WhiteHat Security The terms cyberattack and cyberwar have similar meanings, but there are differences in how we should characterize and regard them. Typically, a […]
10 Considerations When Bringing in IT Outsourcing Contractors versus Working with a Managed Services Provider
By Mitesh Patel, Managing Director, Fifosys Do you really need them or can the internal teams deliver the work? From either outsourcing elements of the support function to a managed […]
Executives Taking the Cybersecurity Wheel at Regent University
Executives are equipped to take the cyber wheel at Regent’s C-suite workshops In today’s lightning-paced world of cybersecurity, an organization needs more than a strong IT team to protect its […]
Cyber-security as a Priority in 2019
Cybersecurity has an increasing impact on the business and future of organizations. By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Cybersecurity is a crucial element these days […]
Top 10 Business Requirements for an Enterprise Cyber Threat Hunting Solution
A cyber threat hunting solution should not simply be another layer of real-time detection. There are significant differences in the goals of a real-time detection tool (like antivirus) and a […]
Five Steps to Least Privilege Success
Getting Organizations Started on a Least Privilege Journey to Reduce Risk By Joseph Carson, Chief Security Scientist, Thycotic Organizations today typically face major challenges when seeking to implement the least […]
Phishing campaign leverages Google Translate as camouflage
Crooks leverage Google Translate service as camouflage on mobile browsers in a phishing campaign aimed at stealing Google account and Facebook credentials. The security expert Larry Cashdollar, a member of […]
Metro Bank is the first bank that disclosed SS7 attacks against its customers
Metro Bank has become the first major bank to disclose SS7 attacks against its customers, but experts believe it isn’t an isolated case. A new type of cyber attack was […]
Five Strategies to Optimize Cloud Security in 2019
By Dannie Combs, CISO at DFIN Article text as more companies move data to the cloud, cybersecurity becomes a growing concern. Keeping ahead of evolving threats takes vigilance and solid […]
Operational Excellence: The Key to Federal Agencies’ Compliance
By Stan Lowe, Global Chief Information Security Officer, Zscaler In many realms of life, there’s a difference between compliance and excellence. For instance, you could build a house that complies […]
What’s next for Cyber-security?
By Min Pyo Hong, CEO, and Founder, SEWORKS What just happened? Unfortunately, many organizations may find themselves asking that question as they review their network security after suffering a breach. […]
Putting Security in Context
by Tim Minahan, Executive Vice President of Business Strategy and Chief Marketing Officer at Citrix Innovation knows no boundaries. It can happen anywhere, anytime. And it doesn’t occur in a […]
From HUMINT to Virtual HUMINT
The new frontier of Intelligence By Antonio Teti Professor of IT Governance and Big Data, University “G. D’Annunzio” di Chieti-Pescara From Humint to Virtual Humint Virtual intelligence, or virtual […]
Overcoming the Cyber-security Staffing Drought
COMPANIES WON’T EVER BE ABLE TO HIRE ENOUGH QUALIFIED PROS. PARTNERING WITH FULL-SERVICE CYBERSECURITY PROVIDERS IS NOW A VIABLE ALTERNATIVE. By Gary Fish, Founder, and CEO, Fishtech Group Introduction Whether […]