Monthly Archives: April 2019

What to look for when selecting an MSSP

by Brad Taylor, CEO, Proficio Medium to large-sized organizations increasingly relies on managed security service providers (MSSPs) to deliver security monitoring, threat detection, and incident response functions. This trend is […]

Posted in Cyber Security News | Comments Off on What to look for when selecting an MSSP

High-Level Strategies for Third-Party Risk Mitigation

By Phil Won, Product Manager, Owl Cyber Defense High-Level Strategies for Third-Party Risk Mitigation There are so many technologies and strategies and buzz words around cybersecurity these days that it […]

Posted in Cyber Security News | Comments Off on High-Level Strategies for Third-Party Risk Mitigation

Attacked on All Sides

Why Enterprise Businesses Must Evolve from Controls-Based Approach to a Cybersecurity Ecosystem. by Otavio Freire CTO & Co-Founder, SafeGuard Cyber If you work in information and cyber security, you could […]

Posted in Cyber Security News | Comments Off on Attacked on All Sides

Front-line defense against cyber-war

Educate End Users By Mison Riggins, Cybersecurity SME / Tech Writer, Inspired eLearning We hear of nuclear, religious, and political wars on the news every day; however, news of the […]

Posted in Cyber Security News | Comments Off on Front-line defense against cyber-war

Here’s How SMBs Can Affordably Protect Themselves

aiMSSP Enables Managed Security Service Providers to Deliver Comprehensive, Affordable, Integrated Security Services to Small-to-Medium Businesses and Enterprises by Arun Gandhi, Director of Product Management, Seceon Today threat surfaces have […]

Posted in Cyber Security News | Comments Off on Here’s How SMBs Can Affordably Protect Themselves

How Certificate Expiration Led to Some of the Largest IT System Failures of the Last Two Years

By Tim Callan, Senior Fellow, Sectigo Our modern IT landscape depends fundamentally on digital certificates. Certificates are nearly ubiquitous in contemporary computing systems and permeate every aspect of our digital […]

Posted in Cyber Security News | Comments Off on How Certificate Expiration Led to Some of the Largest IT System Failures of the Last Two Years

What do Organizations Need to Build a Security Minded Culture?

by Larry Cates, President, and CEO, Global Learning Systems As many organizations struggle with ongoing phishing attacks, data breaches, and lapses in physical security, they continue to wonder why employees […]

Posted in Cyber Security News | Comments Off on What do Organizations Need to Build a Security Minded Culture?

Unlocking Your Users’ Digital Identities with a Selfie

by Dean Nicolls, VP of Marketing, Jumio In the world of digital identity verification, there are two distinct realms: the realm of identity proofing and the realm of authentication. These […]

Posted in Cyber Security News | Comments Off on Unlocking Your Users’ Digital Identities with a Selfie

For better protection, stop buying security products

by Stan Black, Chief Security, and Information Officer, Citrix Do the security products you’re buying make you feel any safer? Are you fundamentally improving your security posture, or are you […]

Posted in Cyber Security News | Comments Off on For better protection, stop buying security products

Attivo Networks and Deception Market Overview

Why Threat Deception Technology Adoption is Soaring by Carolyn Crandall, Chief Deception Officer, Attivo Networks Attivo Networks Company Profile: Attivo Networks, an early innovator in commercial-grade threat deception technology, has […]

Posted in Cyber Security News | Comments Off on Attivo Networks and Deception Market Overview

The Impact of the Marriott Breach and Chinese Mass Surveillance

Lessons Learned from the Recent Marriott Breach by Richard Blech, Founder & CEO at Secure Channels Inc. Marriott International, the world’s largest hotel chain, recently announced a massive data breach. […]

Posted in Cyber Security News | Comments Off on The Impact of the Marriott Breach and Chinese Mass Surveillance

Why Major Data Breaches Will Continue in 2019

Confidential Database Data is at Risk to Data Theft by Hackers by Randy Reiter, CEO, SQL Power Tools Landscape: There has been a multitude of data breaches where hackers or […]

Posted in Cyber Security News | Comments Off on Why Major Data Breaches Will Continue in 2019

Thanks to Human Expertise, Companies Are Stopping Phishing Attacks in Minutes

by Tonia Dudley, Security Solution Advisor, Cofense In a recent 60 Minutes interview, Tesla founder Elon Musk  said,  “Humans  are   underrated.”  His company had just boosted production by creating an […]

Posted in Cyber Security News | Comments Off on Thanks to Human Expertise, Companies Are Stopping Phishing Attacks in Minutes

Fraud Protection and AI in The Financial Markets

The ‘Black Box’ Problem of AI by Davide NG Fania, MD, XTN Cognitive Security Powerful machine-learning techniques have taken the tech world by storm in recent years. AI-based technologies continue […]

Posted in Cyber Security News | Comments Off on Fraud Protection and AI in The Financial Markets

Is Your Encryption Flexible Enough?

Introducing the XOTIC™ Crypto System by Richard Blech, CEO, Secure Channels Inc. ENCRYPTION IS A MUST DEPLOY – CYBER-CRIMINALS IN MOST BREACHES STOLE VALUABLE UN-ENCRYPTED INFORMATION The science of modern […]

Posted in Cyber Security News | Comments Off on Is Your Encryption Flexible Enough?

Cyber Investing Summit Returns to NYC on May 16 2019

Explore the Financial Opportunities, Trends and Strategies in the Cybersecurity Sector Key decision makers, investors, and innovators come together to network, learn, and develop new partnerships. Attendees include venture capitalists, […]

Posted in Cyber Security News | Comments Off on Cyber Investing Summit Returns to NYC on May 16 2019

Blue Cross of Idaho data breach, 5,600 customers affected

Blue Cross of Idaho announced to have suffered a data breach, hackers accessed to the personal information of about 5,600 customers. Blue Cross of Idaho announced suffered a data breach […]

Posted in Cyber Security News | Comments Off on Blue Cross of Idaho data breach, 5,600 customers affected

Integris Software 2019 Data Privacy Maturity Study

As compliance related fines escalate, there is a growing amount of visibility and overconfidence among companies on where their data lives and the processes in place to protect data. Integris […]

Posted in Cyber Security News | Comments Off on Integris Software 2019 Data Privacy Maturity Study

U.S. Army Researchers Identify New Way to Improve Cybersecurity

With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it. […]

Posted in Cyber Security News | Comments Off on U.S. Army Researchers Identify New Way to Improve Cybersecurity

The Role of Security Appliances in SD-WAN Adoption

SD-WAN is one of the hottest networking technologies, and as we head into 2019 its growth is only expected to continue. As a matter of fact, IDC predictsthe SD-WAN infrastructure […]

Posted in Cyber Security News | Comments Off on The Role of Security Appliances in SD-WAN Adoption

Ecuador suffered 40 Million Cyber attacks after the Julian Assange arrest

Ecuador suffered 40 million cyber attacks on websites of public institutions since the arrest of Wikileaks founder Julian Assange. Last week, WikiLeaks founder Julian Assange has been arrested at the […]

Posted in Cyber Security News | Comments Off on Ecuador suffered 40 Million Cyber attacks after the Julian Assange arrest

CSIOS Corporation: Scaling New Heights of Cyber security Services

By Cesar Pie, President, and CEO of CSIOS Corporation Home to the U.S. Cyber Command, the National Security Agency, the Defense Information Systems Agency, the National Institute of Standards and […]

Posted in Cyber Security News | Comments Off on CSIOS Corporation: Scaling New Heights of Cyber security Services

Zero Trust? Not if you’re Surfing the Web

Reshaping the Security Landscape by Daniel Miller, Senior Director Product Marketing, Ericom Software Though it may come off as a bit dramatic, the idea of not placing your faith in […]

Posted in Cyber Security News | Comments Off on Zero Trust? Not if you’re Surfing the Web

Winning The Battle for the Inbox

by John Randall, VP Product Management, EdgeWave Winning the battle for the inbox For virtually everyone, email is the primary way of connecting and doing business. However, as we all […]

Posted in Cyber Security News | Comments Off on Winning The Battle for the Inbox

Threat Intelligence: Data Driven Security

by Liejun Wang, director of 360 threat intelligence center, 360ESG Gartner’s definition of threat intelligence is as follows: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable […]

Posted in Cyber Security News | Comments Off on Threat Intelligence: Data Driven Security

Taking the fight to the cyber criminals

Why organizations urgently need to outsource threat intelligence gathering As cybercrime itself matures into an industry with its own software-as-a-service and highly organized underground professional networks, the task of adequately […]

Posted in Cyber Security News | Comments Off on Taking the fight to the cyber criminals

Inspiring Greater Accountability with Improved Security KPIs

By Lewie Dunsworth, EVP Technical Operations, Herjavec Group The good news is that the CEO and board are more engaged in cybersecurity conversations than ever before. C-Level members are no […]

Posted in Cyber Security News | Comments Off on Inspiring Greater Accountability with Improved Security KPIs

What is a Black Unicorn?

In the venture capital industry, a unicorn refers to any tech startup company that reaches a $1 billion dollar market value as determined by private or public investment. The term […]

Posted in Cyber Security News | Comments Off on What is a Black Unicorn?

Apache fixed an important RCE flaw in Tomcat application server

The Apache Software Foundation has released new versions of the Tomcat application server that address an important remote code execution vulnerability. The new versions of the Tomcat application server address […]

Posted in Cyber Security News | Comments Off on Apache fixed an important RCE flaw in Tomcat application server

Five Things You Need to Know About Next-Gen Authentication

by Dana Tamir, VP Market Strategy at Silverfort Currently four out of five breaches involve the use of compromised or weak credentials. Enforcing multi-factor authentication (MFA) has been proven as […]

Posted in Cyber Security News | Comments Off on Five Things You Need to Know About Next-Gen Authentication

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X