Monthly Archives: March 2019

Security have and have-nots

How organizations can stay above “The Security Poverty Line” By Javvad Malik, security advocate, Alien Vault Way back in around 2010 / 2011 timeframe, Wendy Nether coined the phrase “The […]

Posted in Cyber Security News | Comments Off on Security have and have-nots

Five Steps to Least Privilege Success

Getting Organizations Started on a Least Privilege Journey to Reduce Risk By Joseph Carson, Chief Security Scientist,Thycotic Organizations today typically face major challenges when seeking to implement the least privilege […]

Posted in Cyber Security News | Comments Off on Five Steps to Least Privilege Success

The US Must Catch Up to Other Prominent Powers in Cyber warfare Defense

By Bryan Becker, DAST Product Manager, WhiteHat Security The terms cyberattack and cyberwar have similar meanings, but there are differences to how we should characterize and regard them. Typically, a […]

Posted in Cyber Security News | Comments Off on The US Must Catch Up to Other Prominent Powers in Cyber warfare Defense

NSA released Ghidra, its multi-platform reverse engineering framework

The NSA released the Ghidra, a multi-platform reverse engineering framework that could be used to find vulnerabilities and security holes in applications. In January 2019, the National Security Agency (NSA) […]

Posted in Cyber Security News | Comments Off on NSA released Ghidra, its multi-platform reverse engineering framework

Why threat intelligence is the key to defending against Third party risks

By Karen Levy, Senior Director of Product and Client Marketing at Recorded Future As the march of digitalization continues at an increasingly rapid pace, the business world has become steadily […]

Posted in Cyber Security News | Comments Off on Why threat intelligence is the key to defending against Third party risks

Why Insider Threats Are One of the Biggest Security Risks

By Yuri Martsinovsky, CEO, SoftActivity Many people think that all of the biggest security threats come from outside sources such as hackers. However, the truth is that one of the […]

Posted in Cyber Security News | Comments Off on Why Insider Threats Are One of the Biggest Security Risks

2019 Risks in Focus: Cyber Incidents

Cyber Risk a core business concern according to 2019 Allianz Risk Barometer By Emy Donavan, Global Head – Cyber, Tech and Media PI at Allianz Global Corporate & Specialty In […]

Posted in Cyber Security News | Comments Off on 2019 Risks in Focus: Cyber Incidents

Huawei HCSTC centre opens in Brussels opens to build digital trust through verification standards

The Chinese Telco giant presents the Brussels Huawei HCSTC (Cyber Security Transparency Centre) that will also work on the definition of global security standards. Huawei is urging the adoption of […]

Posted in Cyber Security News | Comments Off on Huawei HCSTC centre opens in Brussels opens to build digital trust through verification standards

Schrodinger’s vulnerability

Using exploitability to avoid chasing phantom risk By Alex Haynes, Head of Information Security, CDL I recently laid eyes on a pentesting report which had the gravest of warnings. ‘The […]

Posted in Cyber Security News | Comments Off on Schrodinger’s vulnerability

The Internet of Things Engineering Insights

by Milica D. Djekic  The new millennium would bring a lot of challenges with itself. The main concern of nowadays would be some security matters that should provide us an […]

Posted in Cyber Security News | Comments Off on The Internet of Things Engineering Insights

Putting Security in Context

By Tim Minahan, Executive Vice President of Business Strategy and Chief Marketing Officer at Citrix Innovation knows no boundaries. It can happen anywhere, anytime. And it doesn’t occur in a […]

Posted in Cyber Security News | Comments Off on Putting Security in Context

Necurs Botnet adopts a new strategy to evade detection

The Necurs Botnet continues to evolve, a new strategy aims at hiding in the shadows, and leverages new payloads to recruits new bots. Necurs botnet is currently the second largest […]

Posted in Cyber Security News | Comments Off on Necurs Botnet adopts a new strategy to evade detection

New Provisions to China’s National Cybersecurity Law Impose Significant Risk on International Businesses

The Institute for Critical Infrastructure Technology’s (ICIT) publication “Did China Just Legalize Espionage?: Recent Provisions to Chinese Law Increases Risk to Multinational Organizations Operating in China” details how recent changes […]

Posted in Cyber Security News | Comments Off on New Provisions to China’s National Cybersecurity Law Impose Significant Risk on International Businesses

Some Important Developments in the Cyber Insurance Industry

Cyber Insurance: The Ultimate Solution to Mitigate Cyber by Swati Tamhankar, Jr-Executive-Digital Marketing, Allied Analytics LLP Technology has become a part of our lives. It is constantly transforming and improving […]

Posted in Cyber Security News | Comments Off on Some Important Developments in the Cyber Insurance Industry

Best Practices for Balancing BYOD with Mobile Security

Protecting Sensitive Data in a Mobile-First World By JT Keating, Vice President of Product Strategy, Zimperium The rapid evolution and advancement of technology have made us almost incapable of separating […]

Posted in Cyber Security News | Comments Off on Best Practices for Balancing BYOD with Mobile Security

Cyber security in New York City, the Financial Capital of the United States

NYC Accelerates the Development of a Cybersecurity Cluster to Protect the Financial Capital from Cyberattacks By Uzi Scheffer, CEO of SOSA New York City is the financial capital of the […]

Posted in Cyber Security News | Comments Off on Cyber security in New York City, the Financial Capital of the United States

Cross-site Scripting Is an Underrated Vulnerability

Find out Why Cross-site Scripting (XSS) is an underrated vulnerability and how this article will transform your thought. By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Cybersecurity […]

Posted in Cyber Security News | Comments Off on Cross-site Scripting Is an Underrated Vulnerability

Are the C-suite and security teams on the same page?

By Matt Lock, Director of Sales Engineers at Varonis With every week seemingly bringing reports of another serious data breach hitting a high-profile organization, and the EU GDPR ushering in […]

Posted in Cyber Security News | Comments Off on Are the C-suite and security teams on the same page?

How to stand be Workforce Ready and Standout with Cyber security Hiring Managers

Millions of job opportunities are available worldwide for qualified cybersecurity professionals. What’s one major must-have for those seeking to fill the vacancies? Academic, technical and leadership skills, together, that set […]

Posted in Cyber Security News | Comments Off on How to stand be Workforce Ready and Standout with Cyber security Hiring Managers

Why Bio-metric Data Use Poses Unique Security Risk

By Morey Haber, CTO, BeyondTrust We live in sensitive times. One “sensitive”, under-discussed topic that we need to directly confront and have an open conversation about is around the sensitivity […]

Posted in Cyber Security News | Comments Off on Why Bio-metric Data Use Poses Unique Security Risk

Why We Need to Rip Off the Cyber security Band-Aids

By Anne Baker, Vice President of Marketing, Adaptiva Last year at the Berkshire Hathaway annual shareholders meeting, the Oracle of Omaha, Warren Buffet, proclaimed, “I don’t know that much about […]

Posted in Cyber Security News | Comments Off on Why We Need to Rip Off the Cyber security Band-Aids

Data Breaches: Beyond Exposing Identities

Exploring the implications of adversaries or competitors using compromised networks to gain a business advantage under the guise of a data breach By Kem Gay, Intelligence Analyst, 4iQ Exposed data […]

Posted in Cyber Security News | Comments Off on Data Breaches: Beyond Exposing Identities

Bringing Shadow IT into the Light with UEM (Unified Endpoint Management)

Productively managing the security risks of unauthorized apps and devices by Robert Troup, Executive Sales Manager, baramundi software USA The prevalence of “Shadow IT” varies between industries and companies, but […]

Posted in Cyber Security News | Comments Off on Bringing Shadow IT into the Light with UEM (Unified Endpoint Management)

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X