Monthly Archives: February 2019

Best Practices for Data Protection

By Eitan Bremler, Co-founder and VP of Product, Safe-T As more companies pursue digital transformation, they may also increase vulnerability to cyber-attacks.  That is because the practice often includes cloud […]

Posted in Cyber Security News | Comments Off on Best Practices for Data Protection

The 5 Most Cringe-Worthy Privileged Data Breaches of 2018

By Morey J. Haber, Chief Technology Officer, Beyond Trust Privileged attack vectors and stolen personally identifiable information (PII) obtained have been a constantly paired news item throughout 2018. In 2019, […]

Posted in Cyber Security News | Comments Off on The 5 Most Cringe-Worthy Privileged Data Breaches of 2018

Mid-Market Businesses, Don’t Think Small about Security

By Jake Kiser, CEO, StrongKey Whether in business or cybersecurity, it doesn’t help small businesses to play small. When it comes to cybercrime, hackers don’t discriminate – they see small […]

Posted in Cyber Security News | Comments Off on Mid-Market Businesses, Don’t Think Small about Security

Automated STIG “Hardening” Finally Comes to Government IT

For the thousands of hard-working men and women responsible for securing government IT networks to the Defense Information Systems Agency’s mandatory “STIG” standards, the task can be daunting and even […]

Posted in Cyber Security News | Comments Off on Automated STIG “Hardening” Finally Comes to Government IT

RSA Conference: $900 discount—last day for sweet deal!

Just like chocolate and flowers, our special Valentine’s Day discount is a limited-time treat. But one thing that lasts forever? All the valuable cybersecurity know-how you’ll gain when you attend […]

Posted in Cyber Security News | Comments Off on RSA Conference: $900 discount—last day for sweet deal!

Bank of Valletta shut down its operations after a cyber attack

Bank of Valletta, the largest bank of Malta was hit by a cyber attack, attackers attempted to steal 13 million euros ($14.7 million). Bank of Valletta the largest bank in Malta […]

Posted in Cyber Security News | Comments Off on Bank of Valletta shut down its operations after a cyber attack

Shattered! Security in a Fragmented World of Workloads

by Satyam Tyagi, Director Product Management, ColorTokens Inc. Look at me, I’m in tatters! Don’t you know the crime rate is going up, up, up, up, up To live in […]

Posted in Cyber Security News | Comments Off on Shattered! Security in a Fragmented World of Workloads

Phishing in the Dark: Employee Security Gaps Are Growing

By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing malware attachments or links to malicious sites. However, as email security solutions improve and phishing awareness […]

Posted in Cyber Security News | Comments Off on Phishing in the Dark: Employee Security Gaps Are Growing

Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. As software becomes more sophisticated, organizations of all sizes continue to harness its capabilities to transform their go-to-market strategies and streamline their […]

Posted in Cyber Security News | Comments Off on Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

CBS News Exclusive: Hackers are stealing millions of medical records – and selling them on the dark web

As health care providers store patients’ medical records digitally, some have left their files vulnerable to being exposed – and even sold on the black market, or the internet’s dark […]

Posted in Cyber Security News | Comments Off on CBS News Exclusive: Hackers are stealing millions of medical records – and selling them on the dark web

Open-Source Code

Quick Review of the “Flat map-stream” attack THE SOCIAL ENGINEERING ATTACK Recently, a malicious attacker socially engineered a developer and had acquired legitimate access to a popular JavaScript library and […]

Posted in Cyber Security News | Comments Off on Open-Source Code

Want to Secure Your Endpoints? Go Beyond the Endpoint

by Jai Balasubramaniyan, Director of Product Management, ColorTokens Inc. Traditional endpoint security control has always been about malware, threat analysis, and remediation. However, it is useless for an endpoint to […]

Posted in Cyber Security News | Comments Off on Want to Secure Your Endpoints? Go Beyond the Endpoint

MetaMask app on Google Play was a Clipboard Hijacker

Security researcher Lukas Stefanko from ESET discovered the first Android cryptocurrency clipboard hijacker impersonating MetaMask on the official Google Play store. The rogue MetaMask app is a Clipboard Hikacker that monitors a device’s clipboard for […]

Posted in Cyber Security News | Comments Off on MetaMask app on Google Play was a Clipboard Hijacker

QuadrigaCX Cryptocurrency Exchange — Password or Death Fail?

Special to Cyber Defense Magazine By Yan Ross News has been coming in this week with many conflicting viewpoints about the implications of the reported death of Gerald Cotten, Founder, […]

Posted in Cyber Security News | Comments Off on QuadrigaCX Cryptocurrency Exchange — Password or Death Fail?

Thousands of RDM refrigeration systems exposed online are at risk

Experts from Safety Detective discovered thousands of refrigeration systems made by Resource Data Management (RDM) exposed to remote attacks. Thousands of instances of a temperature control system made by Resource Data […]

Posted in Cyber Security News | Comments Off on Thousands of RDM refrigeration systems exposed online are at risk

9 Ways to Safeguard Privileged User Accounts and Protect Your Business

By Anusha K. Muralidharan, Product Consultant, ManageEngine At Gartner’s Security and Risk Management Summit in June 2019, the top 10 security projects that chief information security officers (CISOs) should concentrate […]

Posted in Cyber Security News | Comments Off on 9 Ways to Safeguard Privileged User Accounts and Protect Your Business

The US Must Catch Up to Other Prominent Powers in Cyber-warfare Defense

By Bryan Becker, DAST Product Manager, WhiteHat Security The terms cyberattack and cyberwar have similar meanings, but there are differences in how we should characterize and regard them. Typically, a […]

Posted in Cyber Security News | Comments Off on The US Must Catch Up to Other Prominent Powers in Cyber-warfare Defense

10 Considerations When Bringing in IT Outsourcing Contractors versus Working with a Managed Services Provider

By Mitesh Patel, Managing Director, Fifosys Do you really need them or can the internal teams deliver the work? From either outsourcing elements of the support function to a managed […]

Posted in Cyber Security News | Comments Off on 10 Considerations When Bringing in IT Outsourcing Contractors versus Working with a Managed Services Provider

Executives Taking the Cybersecurity Wheel at Regent University

Executives are equipped to take the cyber wheel at Regent’s C-suite workshops In today’s lightning-paced world of cybersecurity, an organization needs more than a strong IT team to protect its […]

Posted in Cyber Security News | Comments Off on Executives Taking the Cybersecurity Wheel at Regent University

Cyber-security as a Priority in 2019

Cybersecurity has an increasing impact on the business and future of organizations. By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Cybersecurity is a crucial element these days […]

Posted in Cyber Security News | Comments Off on Cyber-security as a Priority in 2019

Top 10 Business Requirements for an Enterprise Cyber Threat Hunting Solution

A cyber threat hunting solution should not simply be another layer of real-time detection. There are significant differences in the goals of a real-time detection tool (like antivirus) and a […]

Posted in Cyber Security News | Comments Off on Top 10 Business Requirements for an Enterprise Cyber Threat Hunting Solution

Five Steps to Least Privilege Success

Getting Organizations Started on a Least Privilege Journey to Reduce Risk By Joseph Carson, Chief Security Scientist, Thycotic Organizations today typically face major challenges when seeking to implement the least […]

Posted in Cyber Security News | Comments Off on Five Steps to Least Privilege Success

Phishing campaign leverages Google Translate as camouflage

Crooks leverage Google Translate service as camouflage on mobile browsers in a phishing campaign aimed at stealing Google account and Facebook credentials. The security expert Larry Cashdollar, a member of […]

Posted in Cyber Security News | Comments Off on Phishing campaign leverages Google Translate as camouflage

Metro Bank is the first bank that disclosed SS7 attacks against its customers

Metro Bank has become the first major bank to disclose SS7 attacks against its customers, but experts believe it isn’t an isolated case. A new type of cyber attack was […]

Posted in Cyber Security News | Comments Off on Metro Bank is the first bank that disclosed SS7 attacks against its customers

Five Strategies to Optimize Cloud Security in 2019

By Dannie Combs, CISO at DFIN Article text as more companies move data to the cloud, cybersecurity becomes a growing concern. Keeping ahead of evolving threats takes vigilance and solid […]

Posted in Cyber Security News | Comments Off on Five Strategies to Optimize Cloud Security in 2019

Operational Excellence: The Key to Federal Agencies’ Compliance

By Stan Lowe, Global Chief Information Security Officer, Zscaler In many realms of life, there’s a difference between compliance and excellence. For instance, you could build a house that complies […]

Posted in Cyber Security News | Comments Off on Operational Excellence: The Key to Federal Agencies’ Compliance

What’s next for Cyber-security?

By Min Pyo Hong, CEO, and Founder, SEWORKS What just happened? Unfortunately, many organizations may find themselves asking that question as they review their network security after suffering a breach. […]

Posted in Cyber Security News | Comments Off on What’s next for Cyber-security?

Putting Security in Context

by Tim Minahan, Executive Vice President of Business Strategy and Chief Marketing Officer at Citrix Innovation knows no boundaries. It can happen anywhere, anytime. And it doesn’t occur in a […]

Posted in Cyber Security News | Comments Off on Putting Security in Context

From HUMINT to Virtual HUMINT

The new frontier of Intelligence By Antonio Teti Professor of IT Governance and Big Data, University “G. D’Annunzio” di Chieti-Pescara   From Humint to Virtual Humint Virtual intelligence, or virtual […]

Posted in Cyber Security News | Comments Off on From HUMINT to Virtual HUMINT

Overcoming the Cyber-security Staffing Drought

COMPANIES WON’T EVER BE ABLE TO HIRE ENOUGH QUALIFIED PROS. PARTNERING WITH FULL-SERVICE CYBERSECURITY PROVIDERS IS NOW A VIABLE ALTERNATIVE. By Gary Fish, Founder, and CEO, Fishtech Group  Introduction Whether […]

Posted in Cyber Security News | Comments Off on Overcoming the Cyber-security Staffing Drought

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X