Monthly Archives: May 2019
IMPORTANCE OF “The General Data Protection Regulation” in Cyber Security World
A milestone in personal data protection by Yagiz Atmaça, CTO and Co-Founder, Zemana How much do we share on the internet? Technology keeps on changing with every new day. The […]
Pentester Syndrome
Making things appear worse than they are by Alex Haynes, Information Security Manager, CDL If you work in Enterprise security or in any technical domain you may have at one […]
Security Remains Top Concern for IBM AIX Community
SURVEY OF AIX IT PROFESSIONALS ADDRESSES CHALLENGES AND SECURITY SOLUTIONS THEY PLAN TO IMPLEMENT by Tom Huntington, Executive Vice President, Technical Solutions, HelpSystems Did you know that 2018 marks the […]
Safer Internet Day 2018: Where You’re Falling Short on Your Online Ad Campaigns
by Roy Dovaston, Operations Lead, Click Guardian On 6th February 2018 ‘Safer Internet Day’ was celebrated across the globe with the slogan “Create, Connect and Share respect; A better internet […]
Cyber-attacks thrive the market for Managed Security Services
GROWING VOLUMES OF DATA ON ACCOUNT OF INCREASED IOT ADOPTION AND INCREASED MOBILE DEVICE USAGE AMONG CORPORATE EMPLOYEES HAVE MAINLY FUELED THE DEMAND OF MANAGED SECURITY SERVICES ACROSS THE WORLD. […]
BREAKING NEWS: WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment
Charges Related to Illegally Obtaining, Receiving and Disclosing Classified Information A federal grand jury returned an 18-count superseding indictment today charging Julian P. Assange, 47, the founder of WikiLeaks, with […]
G Suite users’ passwords stored in plain-text for more than 14 years
Google accidentally stored the passwords of its G Suite users in plain-text for 14 years allowing its employees to access them. The news is disconcerting, Google has accidentally stored the […]
Are your emails safe?
Understanding the different types of email security solutions by Scott Raspa, VP, Sales & Marketing, Graphus When we’re talking about cybersecurity, the first thing that comes to mind isn’t always […]
4 Areas with a Growing Cyber Risk of Digital Extortion
By Derrick Rice, Principal Consultant, Asylas In a world where it’s becoming the norm to use digital assets as a medium of exchange and to see systems updating information as […]
Some of the world’s biggest crimes go unnoticed, until it’s too late
As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing day. […]
KB4-Con 2019 Trip Report
Take a Deep Dive Against the Wave of New Threats and Compliance Risks by Gary S. Miliefsky, Publisher, Cyber Defense Magazine KnowBe4’s second annual user conference was held at the […]
The Seven Stages of GDPR Compliance
The European Union’s General Data Protection Regulation (GDPR) becomes law on May 25, 2018. This far-reaching regulation shifts the focus of ownership of data back to individuals – a boon […]
New to Cyber Security Risk Management? Start by answering these questions
By Ivanka Menken, CEO The Art of Service When it comes to Cyber Security, we often don’t know what we don’t know. The rules of the game are changing faster […]
Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?
by Leo Taddeo, Chief Information Security Officer, Cyxtera There’re no big surprises in the recent Technical Alert issued by the Department of Homeland Security (DHS) and Federal Bureau of Investigation […]
Data Security in the Digital Era
by Hiro Imamura, Senior Vice President and General Manager, Business Imaging Solutions Group, Canon U.S.A. What do you envision when you think of the Office of the Future? To Canon, […]
Mobile Apps Loaded with Holes Like Swiss Cheese
One in five Android apps extremely vulnerable by Tae Jin “TJ” Kang, CEO, Insignary, Inc. Study Finds One in Five of 700 Most Popular Android Apps Have Numerous Known Open […]
Key Considerations for Identity Governance in the Cloud
by Rick Weinberg, Vice President of Product Management, SailPoint Cloud is transforming the way we work, and today’s enterprises are seeing the many benefits of cloud migration for some or […]
5 Things the Trump Administration Got Right on Cyber security
By Raz Rafaeli, CEO, and co-founder of Secret Double Octopus Disclaimer: This is my personal opinion piece and not the views of Cyber Defense Magazine – I appreciate the opportunity […]
3 Emerging Technologies Impacting Cyber Security
by Julia Sowells, Security Expert, Hacker Combat It’s a cat and mouse game between cybersecurity experts and cybercriminals. While the security guys endeavor to protect users and information, the criminals […]
Regulating Against a Data Breach
By Jim Shagawat, founder of Windfall Wealth™ In March of 2014, the Security and Exchange Commission (SEC) Office of Compliance Inspections and Examinations (OCIE) sponsored a cybersecurity roundtable discussing the […]
Don’t Leave Vulnerability Management to Chance
by Karim Toubba, CEO, Kenna Security While there is no shortage of strategies, best practices, industry recommendations and white papers on the topic of vulnerability remediation; there is a shocking […]
On the Clock
Why time is crucial in security execution by Brad O’Hearne DISCLAIMER: As with all security operations, always act in accordance with the highest standard of legality and ethics, making sure […]
What can we learn about Cyber from the flu?
by Eric Trexler, Vice President, Global Governments and Critical Infrastructure, Forcepoint Now that we’ve rounded the corner of the unpredictable winter 2018 in the Northeastern US and are finally closing […]
Reduced Swap will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs
by Rick Lober, Defense and Intelligence Systems Division Vice President and General Manager, Hughes Network Systems UAV Predator pictured above, source: Wikicommons Militaries in the past adhered to the philosophy […]
5 Things Everyone Needs to Know About Cyber security
Practical ways to prevent a cyber-attack by Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of when you hear the word “cybersecurity”? For some, just the name sounds ominous […]
The case study: cyber camouflage scenario
by Milica D. Djekic The military doctrine would suggest to us how camouflaging on the battlefield could be from strategic importance in order to prevent your army from the potential […]
A joint operation by international police dismantled GozNym gang
A joint effort by international law enforcement agencies from 6 different countries has dismantled the crime gang behind the GozNym banking malware. GozNym banking malware is considered one of the most […]
Cloud Direct Connects: The Best Bet for Cyber Security
by Tim Fogarty, Director of Enterprise, Shamrock Consulting Group If you are a member of corporate IT leadership, you’re likely already aware of the many benefits associated with relocating your […]
Synthetic identity fraud and social engineering are growing concerns and on the rise
by Christina Luttrell With the customer, not present identity fraud becoming an increasingly prevalent issue, major shifts in the fraud landscape have had far-reaching effects across multiple industries. Businesses are […]
CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats
by Liviu Arsene, Global Cybersecurity Analyst, Bitdefender In a fast-changing landscape where large cyber attacks make the news virtually every month, companies have started shifting their security defense paradigm towards […]