Monthly Archives: March 2019
Security have and have-nots
How organizations can stay above “The Security Poverty Line” By Javvad Malik, security advocate, Alien Vault Way back in around 2010 / 2011 timeframe, Wendy Nether coined the phrase “The […]
Five Steps to Least Privilege Success
Getting Organizations Started on a Least Privilege Journey to Reduce Risk By Joseph Carson, Chief Security Scientist,Thycotic Organizations today typically face major challenges when seeking to implement the least privilege […]
The US Must Catch Up to Other Prominent Powers in Cyber warfare Defense
By Bryan Becker, DAST Product Manager, WhiteHat Security The terms cyberattack and cyberwar have similar meanings, but there are differences to how we should characterize and regard them. Typically, a […]
NSA released Ghidra, its multi-platform reverse engineering framework
The NSA released the Ghidra, a multi-platform reverse engineering framework that could be used to find vulnerabilities and security holes in applications. In January 2019, the National Security Agency (NSA) […]
Why threat intelligence is the key to defending against Third party risks
By Karen Levy, Senior Director of Product and Client Marketing at Recorded Future As the march of digitalization continues at an increasingly rapid pace, the business world has become steadily […]
Why Insider Threats Are One of the Biggest Security Risks
By Yuri Martsinovsky, CEO, SoftActivity Many people think that all of the biggest security threats come from outside sources such as hackers. However, the truth is that one of the […]
2019 Risks in Focus: Cyber Incidents
Cyber Risk a core business concern according to 2019 Allianz Risk Barometer By Emy Donavan, Global Head – Cyber, Tech and Media PI at Allianz Global Corporate & Specialty In […]
Huawei HCSTC centre opens in Brussels opens to build digital trust through verification standards
The Chinese Telco giant presents the Brussels Huawei HCSTC (Cyber Security Transparency Centre) that will also work on the definition of global security standards. Huawei is urging the adoption of […]
Schrodinger’s vulnerability
Using exploitability to avoid chasing phantom risk By Alex Haynes, Head of Information Security, CDL I recently laid eyes on a pentesting report which had the gravest of warnings. ‘The […]
The Internet of Things Engineering Insights
by Milica D. Djekic The new millennium would bring a lot of challenges with itself. The main concern of nowadays would be some security matters that should provide us an […]
Putting Security in Context
By Tim Minahan, Executive Vice President of Business Strategy and Chief Marketing Officer at Citrix Innovation knows no boundaries. It can happen anywhere, anytime. And it doesn’t occur in a […]
Necurs Botnet adopts a new strategy to evade detection
The Necurs Botnet continues to evolve, a new strategy aims at hiding in the shadows, and leverages new payloads to recruits new bots. Necurs botnet is currently the second largest […]
New Provisions to China’s National Cybersecurity Law Impose Significant Risk on International Businesses
The Institute for Critical Infrastructure Technology’s (ICIT) publication “Did China Just Legalize Espionage?: Recent Provisions to Chinese Law Increases Risk to Multinational Organizations Operating in China” details how recent changes […]
Some Important Developments in the Cyber Insurance Industry
Cyber Insurance: The Ultimate Solution to Mitigate Cyber by Swati Tamhankar, Jr-Executive-Digital Marketing, Allied Analytics LLP Technology has become a part of our lives. It is constantly transforming and improving […]
Best Practices for Balancing BYOD with Mobile Security
Protecting Sensitive Data in a Mobile-First World By JT Keating, Vice President of Product Strategy, Zimperium The rapid evolution and advancement of technology have made us almost incapable of separating […]
Cyber security in New York City, the Financial Capital of the United States
NYC Accelerates the Development of a Cybersecurity Cluster to Protect the Financial Capital from Cyberattacks By Uzi Scheffer, CEO of SOSA New York City is the financial capital of the […]
Cross-site Scripting Is an Underrated Vulnerability
Find out Why Cross-site Scripting (XSS) is an underrated vulnerability and how this article will transform your thought. By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Cybersecurity […]
Are the C-suite and security teams on the same page?
By Matt Lock, Director of Sales Engineers at Varonis With every week seemingly bringing reports of another serious data breach hitting a high-profile organization, and the EU GDPR ushering in […]
How to stand be Workforce Ready and Standout with Cyber security Hiring Managers
Millions of job opportunities are available worldwide for qualified cybersecurity professionals. What’s one major must-have for those seeking to fill the vacancies? Academic, technical and leadership skills, together, that set […]
Why Bio-metric Data Use Poses Unique Security Risk
By Morey Haber, CTO, BeyondTrust We live in sensitive times. One “sensitive”, under-discussed topic that we need to directly confront and have an open conversation about is around the sensitivity […]
Why We Need to Rip Off the Cyber security Band-Aids
By Anne Baker, Vice President of Marketing, Adaptiva Last year at the Berkshire Hathaway annual shareholders meeting, the Oracle of Omaha, Warren Buffet, proclaimed, “I don’t know that much about […]
Data Breaches: Beyond Exposing Identities
Exploring the implications of adversaries or competitors using compromised networks to gain a business advantage under the guise of a data breach By Kem Gay, Intelligence Analyst, 4iQ Exposed data […]
Bringing Shadow IT into the Light with UEM (Unified Endpoint Management)
Productively managing the security risks of unauthorized apps and devices by Robert Troup, Executive Sales Manager, baramundi software USA The prevalence of “Shadow IT” varies between industries and companies, but […]