Monthly Archives: March 2019
4 Concrete Ways Threat Intelligence Can Make Organizations Safer
by Jonathan Zhang, Founder, and CEO, Threat Intelligence Platform The practice of threat intelligence (TI) is gaining momentum, helping organizations of all sizes to better understand and fix their weak […]
How SOAR Can Help You Get Amazing Results from Your Security Analysts
by Stan Engelbrecht, Director of Cybersecurity Practice, D3 Security Security orchestration, automation, and response (SOAR) platforms are becoming increasingly prevalent security operations tools, emerging out of the categories of incident […]
Inadequate Cyber security Hurts Where it Counts the Most
By Adrejia L. A. Boutté Swafford, Partner/Attorney at Christovich & Kearney, LLP According to the Merriam-Webster.com Dictionary the term, “cybersecurity,” first used in the year 1998, are the “measures taken […]
South Korea – 1,600 guests at 30 motels secretly live streamed
Four people from South Korea are accused of secretly live streaming, and selling videos made with spy-cam installed in 42 motel rooms at 30 motels in 10 cities in South […]
Thomas Edison: An Inspiration for Cybersecurity Inventions
As an inventor and patent holder on various cybersecurity inventions and having been involved in the eary days of the internet, including having the opportunity to be in the RFC […]
EpochTimes Exclusive: Supermicro Backup Server Used by Hillary Clinton Highlights Security Risks of China Supply Chain
BY ANNIE WU, EPOCH TIMES (EXCERPT) March 22, 2019 A little-noticed detail in the FBI’s investigation files related to former U.S. Secretary of State Hillary Clinton’s email servers has highlighted […]
The Four Most Serious Threats Facing Online Businesses In 2018
by Matt Davis, Future Hosting Online crime will cost businesses $2 trillion in 2019. SME’s can’t afford to ignore the risk posed by DDoS attacks, ransomware, phishing, and crypto jacking. […]
Going Beyond HIPAA Compliance: A Case Study
By Josh Paape A Case Study on how Black River Memorial Hospital Improved Security Posture HIPAA compliance is a big piece of any healthcare organization’s cybersecurity process. However, the goal […]
Signs That Indicate Your WordPress Site is Hacked
By Julia Sowells Discovering a website hack on time is very important; if you detect it late, it would already have caused you great damage. Here, in this article, we’ll […]
Google white hat hacker found new bug class in Windows
James Forshaw, a white hat hacker at Google Project Zero, has discovered a new class of bugs that affect Windows and some of its drivers. Google Project Zero hacker James […]
Why Your Cybersecurity Strategy Should Include Managed File Transfer
Protecting Sensitive Files In January of this year, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, came to a settlement for their 2014 […]
Cyber Security Statistics for 2019
Cybersecurity is often seen as one of those big problems that only large entities like banks, tech companies, and governments have to worry about. In reality, a lot more people […]
Psychological Operations Behind Ransomware Attacks
By Milica D. Djekic The ransomware attacks could cause the sabotage of your entire IT infrastructure and you would agree with us that it’s not pleasant at all to get […]
Best Practices to Minimize Negative Impact,Downtime After a Ransomware Infection
by Jim Varner, President, and CEO, SecurityFirst Ransomware has become a scourge to businesses around the globe and always manages to find a way to infiltrate even the best defenses. […]
Where do I “Sign”?
A short Review on Digital Signatures by Joe Guerra, Cybersecurity Instructor, Hallmark University The fundamentals of data security are defined as applying techniques, procedures and other means to protect the confidentiality, availability, […]
EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks
Europol announced the EU Law Enforcement Emergency Response Protocol new protocol for law enforcement agencies in the European Union and abroad to handle major cross-border cyberattacks. Europol announced the adoption […]
Wilbur WannaCry: Captured Cyber-villain or Has He Broken Free?
I was talking with my friend Gary Berman, aka “Cyber Hero”, you know – the man behind the curtain at the wildly popular CyberHero Adventures comics? We were discussing one […]
Role based access control and best implementation practices
by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc A role is a collection of permissions, and users receive permissions through the roles they have been assigned. Role Based Access […]
Service account management (SAM) challenges and best practices
by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc Introduction This article focuses more on the real-world challenges and which best practices should be adapted to overcome those challenges in […]
How do we get privacy?
Revisiting the Basics and Importance of Cryptography by Joe Guerra, Cybersecurity Instructor, Hallmark University Since the onset of technology in society, it has broken the levees of data and has […]
Experts uncovered a malspam campaign using Boeing 737 Max crash
Experts at the 360 Threat Intelligence Center uncovered a new malspam campaign that leverages the tragic Boeing 737 Max crash to spread malware. Crooks always attempt to exploit the attention […]
Cyber security as a mandatory rule in this Era
A cyber vision to cyber success. by Pedro Tavares, Founder at CSIRT.UBI & seguranca-informatica.pt Cybersecurity attacks and data breaches have been making headlines recently. Do you think that cybersecurity represents […]
What recent industry data leaks tell us about CYBER-SECURITY
by Mark Wah, Principal Product Manager at Citrix The cat and mouse game of hackers chasing data and organizations working to secure their customers’ personal information continues, requiring security teams […]
How to keep your home devices from being compromised
by Anthony, Founder at EquipmentArea.com There are now a lot of home device trends on how one can improve one’s home and make it more convenient and accessible. With the […]
Why You Don’t Need (or Want) a SIEM Tool
There are a lot of things that sound good on paper, but don’t work out as planned in practice: Hot dog buns that are sliced on the top, being a […]
Recently fixed WinRAR bug actively exploited in the wild
Several threat actors are still exploiting a recently patched critical vulnerability in the popular compression software WinRAR. Several threat actors are actively exploiting a critical remote code execution vulnerability recently […]
What CISOs really want
The Top 3 Things They Want You To Know by Josh Fu, Principal Security Engineer, Cylance Living in Minneapolis is ‘pretty excellent’. Yes, it’s winter eight months out of the […]
Cyber security in the era of Agile software development – Part 1
by Ivan De Los Santos Organizations of all sizes are adopting agile software techniques in order to better cope with changing requirements and the need to deliver value fast. In […]
Think like a hacker! and other tips to make you cyber resilient
by Arik Liberzon, Founder of Pcysys Think like a hacker. It seems so obvious but you might be surprised to hear that most cybersecurity professionals were taught to think about […]
Breaking down barriers to effective security with user and entity behavior analytics
by Orion Cassetto, senior director of Product Marketing at Exabeam The global cyber threat landscape is growing and evolving all the time – but fortunately, so are the technology solutions […]