Monthly Archives: April 2019
What to look for when selecting an MSSP
by Brad Taylor, CEO, Proficio Medium to large-sized organizations increasingly relies on managed security service providers (MSSPs) to deliver security monitoring, threat detection, and incident response functions. This trend is […]
High-Level Strategies for Third-Party Risk Mitigation
By Phil Won, Product Manager, Owl Cyber Defense High-Level Strategies for Third-Party Risk Mitigation There are so many technologies and strategies and buzz words around cybersecurity these days that it […]
Attacked on All Sides
Why Enterprise Businesses Must Evolve from Controls-Based Approach to a Cybersecurity Ecosystem. by Otavio Freire CTO & Co-Founder, SafeGuard Cyber If you work in information and cyber security, you could […]
Front-line defense against cyber-war
Educate End Users By Mison Riggins, Cybersecurity SME / Tech Writer, Inspired eLearning We hear of nuclear, religious, and political wars on the news every day; however, news of the […]
Here’s How SMBs Can Affordably Protect Themselves
aiMSSP Enables Managed Security Service Providers to Deliver Comprehensive, Affordable, Integrated Security Services to Small-to-Medium Businesses and Enterprises by Arun Gandhi, Director of Product Management, Seceon Today threat surfaces have […]
How Certificate Expiration Led to Some of the Largest IT System Failures of the Last Two Years
By Tim Callan, Senior Fellow, Sectigo Our modern IT landscape depends fundamentally on digital certificates. Certificates are nearly ubiquitous in contemporary computing systems and permeate every aspect of our digital […]
What do Organizations Need to Build a Security Minded Culture?
by Larry Cates, President, and CEO, Global Learning Systems As many organizations struggle with ongoing phishing attacks, data breaches, and lapses in physical security, they continue to wonder why employees […]
Unlocking Your Users’ Digital Identities with a Selfie
by Dean Nicolls, VP of Marketing, Jumio In the world of digital identity verification, there are two distinct realms: the realm of identity proofing and the realm of authentication. These […]
For better protection, stop buying security products
by Stan Black, Chief Security, and Information Officer, Citrix Do the security products you’re buying make you feel any safer? Are you fundamentally improving your security posture, or are you […]
Attivo Networks and Deception Market Overview
Why Threat Deception Technology Adoption is Soaring by Carolyn Crandall, Chief Deception Officer, Attivo Networks Attivo Networks Company Profile: Attivo Networks, an early innovator in commercial-grade threat deception technology, has […]
The Impact of the Marriott Breach and Chinese Mass Surveillance
Lessons Learned from the Recent Marriott Breach by Richard Blech, Founder & CEO at Secure Channels Inc. Marriott International, the world’s largest hotel chain, recently announced a massive data breach. […]
Why Major Data Breaches Will Continue in 2019
Confidential Database Data is at Risk to Data Theft by Hackers by Randy Reiter, CEO, SQL Power Tools Landscape: There has been a multitude of data breaches where hackers or […]
Thanks to Human Expertise, Companies Are Stopping Phishing Attacks in Minutes
by Tonia Dudley, Security Solution Advisor, Cofense In a recent 60 Minutes interview, Tesla founder Elon Musk said, “Humans are underrated.” His company had just boosted production by creating an […]
Fraud Protection and AI in The Financial Markets
The ‘Black Box’ Problem of AI by Davide NG Fania, MD, XTN Cognitive Security Powerful machine-learning techniques have taken the tech world by storm in recent years. AI-based technologies continue […]
Is Your Encryption Flexible Enough?
Introducing the XOTIC™ Crypto System by Richard Blech, CEO, Secure Channels Inc. ENCRYPTION IS A MUST DEPLOY – CYBER-CRIMINALS IN MOST BREACHES STOLE VALUABLE UN-ENCRYPTED INFORMATION The science of modern […]
Cyber Investing Summit Returns to NYC on May 16 2019
Explore the Financial Opportunities, Trends and Strategies in the Cybersecurity Sector Key decision makers, investors, and innovators come together to network, learn, and develop new partnerships. Attendees include venture capitalists, […]
Blue Cross of Idaho data breach, 5,600 customers affected
Blue Cross of Idaho announced to have suffered a data breach, hackers accessed to the personal information of about 5,600 customers. Blue Cross of Idaho announced suffered a data breach […]
Integris Software 2019 Data Privacy Maturity Study
As compliance related fines escalate, there is a growing amount of visibility and overconfidence among companies on where their data lives and the processes in place to protect data. Integris […]
U.S. Army Researchers Identify New Way to Improve Cybersecurity
With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it. […]
The Role of Security Appliances in SD-WAN Adoption
SD-WAN is one of the hottest networking technologies, and as we head into 2019 its growth is only expected to continue. As a matter of fact, IDC predictsthe SD-WAN infrastructure […]
Ecuador suffered 40 Million Cyber attacks after the Julian Assange arrest
Ecuador suffered 40 million cyber attacks on websites of public institutions since the arrest of Wikileaks founder Julian Assange. Last week, WikiLeaks founder Julian Assange has been arrested at the […]
CSIOS Corporation: Scaling New Heights of Cyber security Services
By Cesar Pie, President, and CEO of CSIOS Corporation Home to the U.S. Cyber Command, the National Security Agency, the Defense Information Systems Agency, the National Institute of Standards and […]
Zero Trust? Not if you’re Surfing the Web
Reshaping the Security Landscape by Daniel Miller, Senior Director Product Marketing, Ericom Software Though it may come off as a bit dramatic, the idea of not placing your faith in […]
Winning The Battle for the Inbox
by John Randall, VP Product Management, EdgeWave Winning the battle for the inbox For virtually everyone, email is the primary way of connecting and doing business. However, as we all […]
Threat Intelligence: Data Driven Security
by Liejun Wang, director of 360 threat intelligence center, 360ESG Gartner’s definition of threat intelligence is as follows: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable […]
Taking the fight to the cyber criminals
Why organizations urgently need to outsource threat intelligence gathering As cybercrime itself matures into an industry with its own software-as-a-service and highly organized underground professional networks, the task of adequately […]
Inspiring Greater Accountability with Improved Security KPIs
By Lewie Dunsworth, EVP Technical Operations, Herjavec Group The good news is that the CEO and board are more engaged in cybersecurity conversations than ever before. C-Level members are no […]
What is a Black Unicorn?
In the venture capital industry, a unicorn refers to any tech startup company that reaches a $1 billion dollar market value as determined by private or public investment. The term […]
Apache fixed an important RCE flaw in Tomcat application server
The Apache Software Foundation has released new versions of the Tomcat application server that address an important remote code execution vulnerability. The new versions of the Tomcat application server address […]
Five Things You Need to Know About Next-Gen Authentication
by Dana Tamir, VP Market Strategy at Silverfort Currently four out of five breaches involve the use of compromised or weak credentials. Enforcing multi-factor authentication (MFA) has been proven as […]