Monthly Archives: May 2019

IMPORTANCE OF “The General Data Protection Regulation” in Cyber Security World

A milestone in personal data protection by Yagiz Atmaça, CTO and Co-Founder, Zemana How much do we share on the internet? Technology keeps on changing with every new day. The […]

Posted in Cyber Security News | Comments Off on IMPORTANCE OF “The General Data Protection Regulation” in Cyber Security World

Pentester Syndrome

Making things appear worse than they are by Alex Haynes, Information Security Manager, CDL If you work in Enterprise security or in any technical domain you may have at one […]

Posted in Cyber Security News | Comments Off on Pentester Syndrome

Security Remains Top Concern for IBM AIX Community

SURVEY OF AIX IT PROFESSIONALS ADDRESSES CHALLENGES AND SECURITY SOLUTIONS THEY PLAN TO IMPLEMENT by Tom Huntington, Executive Vice President, Technical Solutions, HelpSystems Did you know that 2018 marks the […]

Posted in Cyber Security News | Comments Off on Security Remains Top Concern for IBM AIX Community

Safer Internet Day 2018: Where You’re Falling Short on Your Online Ad Campaigns

by Roy Dovaston, Operations Lead, Click Guardian On 6th February 2018 ‘Safer Internet Day’ was celebrated across the globe with the slogan “Create, Connect and Share respect; A better internet […]

Posted in Cyber Security News | Comments Off on Safer Internet Day 2018: Where You’re Falling Short on Your Online Ad Campaigns

Cyber-attacks thrive the market for Managed Security Services

GROWING VOLUMES OF DATA ON ACCOUNT OF INCREASED IOT ADOPTION AND INCREASED MOBILE DEVICE USAGE AMONG CORPORATE EMPLOYEES HAVE MAINLY FUELED THE DEMAND OF MANAGED SECURITY SERVICES ACROSS THE WORLD. […]

Posted in Cyber Security News | Comments Off on Cyber-attacks thrive the market for Managed Security Services

BREAKING NEWS: WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment

Charges Related to Illegally Obtaining, Receiving and Disclosing Classified Information A federal grand jury returned an 18-count superseding indictment today charging Julian P. Assange, 47, the founder of WikiLeaks, with […]

Posted in Cyber Security News | Comments Off on BREAKING NEWS: WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment

G Suite users’ passwords stored in plain-text for more than 14 years

Google accidentally stored the passwords of its G Suite users in plain-text for 14 years allowing its employees to access them. The news is disconcerting, Google has accidentally stored the […]

Posted in Cyber Security News | Comments Off on G Suite users’ passwords stored in plain-text for more than 14 years

Are your emails safe?

Understanding the different types of email security solutions by Scott Raspa, VP, Sales & Marketing, Graphus When we’re talking about cybersecurity, the first thing that comes to mind isn’t always […]

Posted in Cyber Security News | Comments Off on Are your emails safe?

4 Areas with a Growing Cyber Risk of Digital Extortion

By Derrick Rice, Principal Consultant, Asylas In a world where it’s becoming the norm to use digital assets as a medium of exchange and to see systems updating information as […]

Posted in Cyber Security News | Comments Off on 4 Areas with a Growing Cyber Risk of Digital Extortion

Some of the world’s biggest crimes go unnoticed, until it’s too late

As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing day. […]

Posted in Cyber Security News | Comments Off on Some of the world’s biggest crimes go unnoticed, until it’s too late

KB4-Con 2019 Trip Report

Take a Deep Dive Against the Wave of New Threats and Compliance Risks by Gary S. Miliefsky, Publisher, Cyber Defense Magazine KnowBe4’s second annual user conference was held at the […]

Posted in Cyber Security News | Comments Off on KB4-Con 2019 Trip Report

The Seven Stages of GDPR Compliance

The European Union’s General Data Protection Regulation (GDPR) becomes law on May 25, 2018. This far-reaching regulation shifts the focus of ownership of data back to individuals – a boon […]

Posted in Cyber Security News | Comments Off on The Seven Stages of GDPR Compliance

New to Cyber Security Risk Management? Start by answering these questions

By Ivanka Menken, CEO The Art of Service When it comes to Cyber Security, we often don’t know what we don’t know. The rules of the game are changing faster […]

Posted in Cyber Security News | Comments Off on New to Cyber Security Risk Management? Start by answering these questions

Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?

by Leo Taddeo, Chief Information Security Officer, Cyxtera There’re no big surprises in the recent Technical Alert issued by the Department of Homeland Security (DHS) and Federal Bureau of Investigation […]

Posted in Cyber Security News | Comments Off on Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?

Data Security in the Digital Era

by Hiro Imamura, Senior Vice President and General Manager, Business Imaging Solutions Group, Canon U.S.A. What do you envision when you think of the Office of the Future? To Canon, […]

Posted in Cyber Security News | Comments Off on Data Security in the Digital Era

Mobile Apps Loaded with Holes Like Swiss Cheese

One in five Android apps extremely vulnerable by Tae Jin “TJ” Kang, CEO, Insignary, Inc. Study Finds One in Five of 700 Most Popular Android Apps Have Numerous Known Open […]

Posted in Cyber Security News | Comments Off on Mobile Apps Loaded with Holes Like Swiss Cheese

Key Considerations for Identity Governance in the Cloud

by Rick Weinberg, Vice President of Product Management, SailPoint Cloud is transforming the way we work, and today’s enterprises are seeing the many benefits of cloud migration for some or […]

Posted in Cyber Security News | Comments Off on Key Considerations for Identity Governance in the Cloud

5 Things the Trump Administration Got Right on Cyber security

By Raz Rafaeli, CEO, and co-founder of Secret Double Octopus Disclaimer: This is my personal opinion piece and not the views of Cyber Defense Magazine – I appreciate the opportunity […]

Posted in Cyber Security News | Comments Off on 5 Things the Trump Administration Got Right on Cyber security

3 Emerging Technologies Impacting Cyber Security

by Julia Sowells, Security Expert, Hacker Combat It’s a cat and mouse game between cybersecurity experts and cybercriminals. While the security guys endeavor to protect users and information, the criminals […]

Posted in Cyber Security News | Comments Off on 3 Emerging Technologies Impacting Cyber Security

Regulating Against a Data Breach

By Jim Shagawat, founder of Windfall Wealth™ In March of 2014, the Security and Exchange Commission (SEC) Office of Compliance Inspections and Examinations (OCIE) sponsored a cybersecurity roundtable discussing the […]

Posted in Cyber Security News | Comments Off on Regulating Against a Data Breach

Don’t Leave Vulnerability Management to Chance

by Karim Toubba, CEO, Kenna Security While there is no shortage of strategies, best practices, industry recommendations and white papers on the topic of vulnerability remediation; there is a shocking […]

Posted in Cyber Security News | Comments Off on Don’t Leave Vulnerability Management to Chance

On the Clock

Why time is crucial in security execution by Brad O’Hearne DISCLAIMER: As with all security operations, always act in accordance with the highest standard of legality and ethics, making sure […]

Posted in Cyber Security News | Comments Off on On the Clock

What can we learn about Cyber from the flu?

by Eric Trexler, Vice President, Global Governments and Critical Infrastructure, Forcepoint Now that we’ve rounded the corner of the unpredictable winter 2018 in the Northeastern US and are finally closing […]

Posted in Cyber Security News | Comments Off on What can we learn about Cyber from the flu?

Reduced Swap will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs

by Rick Lober, Defense and Intelligence Systems Division Vice President and General Manager, Hughes Network Systems UAV Predator pictured above, source: Wikicommons Militaries in the past adhered to the philosophy […]

Posted in Cyber Security News | Comments Off on Reduced Swap will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs

5 Things Everyone Needs to Know About Cyber security

Practical ways to prevent a cyber-attack by Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of when you hear the word “cybersecurity”? For some, just the name sounds ominous […]

Posted in Cyber Security News | Comments Off on 5 Things Everyone Needs to Know About Cyber security

The case study: cyber camouflage scenario

by Milica D. Djekic The military doctrine would suggest to us how camouflaging on the battlefield could be from strategic importance in order to prevent your army from the potential […]

Posted in Cyber Security News | Comments Off on The case study: cyber camouflage scenario

A joint operation by international police dismantled GozNym gang

A joint effort by international law enforcement agencies from 6 different countries has dismantled the crime gang behind the GozNym banking malware. GozNym banking malware is considered one of the most […]

Posted in Cyber Security News | Comments Off on A joint operation by international police dismantled GozNym gang

Cloud Direct Connects: The Best Bet for Cyber Security

by Tim Fogarty, Director of Enterprise, Shamrock Consulting Group If you are a member of corporate IT leadership, you’re likely already aware of the many benefits associated with relocating your […]

Posted in Cyber Security News | Comments Off on Cloud Direct Connects: The Best Bet for Cyber Security

Synthetic identity fraud and social engineering are growing concerns and on the rise

by Christina Luttrell With the customer, not present identity fraud becoming an increasingly prevalent issue, major shifts in the fraud landscape have had far-reaching effects across multiple industries. Businesses are […]

Posted in Cyber Security News | Comments Off on Synthetic identity fraud and social engineering are growing concerns and on the rise

CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats

by Liviu Arsene, Global Cybersecurity Analyst, Bitdefender In a fast-changing landscape where large cyber attacks make the news virtually every month, companies have started shifting their security defense paradigm towards […]

Posted in Cyber Security News | Comments Off on CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X