Monthly Archives: May 2019

Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS flaw allowing WannaCry-Like attacks. Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including […]

Posted in Cyber Security News | Comments Off on Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

The Attribution Problem – Using PAI to Improve Actor Attribution

By Brian Pate, SVP, Babel Street Within the cyber community, conventional wisdom is that malicious actors can carry out attacks while hiding their true identities. Historically, analysts and investigators have […]

Posted in Cyber Security News | Comments Off on The Attribution Problem – Using PAI to Improve Actor Attribution

Why CIOs/CISO’s Positions Are Becoming More Challenging

By Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company It’s your worst possible nightmare. A hacker has breached the company’s network and shut down its […]

Posted in Cyber Security News | Comments Off on Why CIOs/CISO’s Positions Are Becoming More Challenging

The Hottest Career on the Block

By Nick Galov Our world is changing fast. Thirty years ago, you left school, choose a potential career path, and worked towards earning the appropriate qualification. You’d then find work […]

Posted in Cyber Security News | Comments Off on The Hottest Career on the Block

The Critical Role TAPs Play in Network Security and Resiliency

By Alastair Hartrup, CEO, Network Critical Networks continue to be under persistent attack. As a matter of fact, according to CyberEdge’s 2019 Cyberthreat Defense Report, the percentage of organizations breached […]

Posted in Cyber Security News | Comments Off on The Critical Role TAPs Play in Network Security and Resiliency

WhatsApp zero-day exploited in targeted attacks to deliver NSO spyware

Facebook fixed a critical zero-day flaw in WhatsApp that has been exploited to remotely install spyware on phones by calling the targeted device.  Facebook has recently patched a critical zero-day […]

Posted in Cyber Security News | Tagged , , , | Comments Off on WhatsApp zero-day exploited in targeted attacks to deliver NSO spyware

Is Your Encryption Flexible Enough?

Introducing the XOTIC™ Crypto System By Richard Blech, CEO, Secure Channels Inc. Introduction The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret […]

Posted in Cyber Security News | Comments Off on Is Your Encryption Flexible Enough?

The Role of Security Appliances in SD-WAN Adoption

By Brendan Patterson, Vice President of Product Management at WatchGuard Technologies SD-WAN is one of the hottest networking technologies, and as we head into 2019 its growth is only expected […]

Posted in Cyber Security News | Comments Off on The Role of Security Appliances in SD-WAN Adoption

May Patch Tuesday

Be Aware of Skype for Android Vulnerability and Windows Error Reporting Elevation of Privilege Vulnerability by Chris Goettl, Director of Product Management, Security, Ivanti Looks like a busy, but pretty […]

Posted in Cyber Security News | Comments Off on May Patch Tuesday

Data Sniffing is Threatening Your Personal IoT. Here’s a Workaround

By William J. Tomlinson, Ph.D., Senior Member of the Technical Staff at Draper The human body is becoming a node in the Internet of Things, and that may be creating […]

Posted in Cyber Security News | Comments Off on Data Sniffing is Threatening Your Personal IoT. Here’s a Workaround

Security breach suffered by credit bureau Equifax has cost $1.4 Billion

Equifax revealed its earnings release related to the security breach suffered in 2017, the incident has cost about $1.4 billion plus legal fees. Equifax revealed this week its earnings release related to […]

Posted in Cyber Security News | Comments Off on Security breach suffered by credit bureau Equifax has cost $1.4 Billion

Why Cyber Defense in the Power Industry is so Unique

By Gowri Rajappan, Director of Technology and Cybersecurity at Doble Engineering Company Every organization connected to the internet is at risk of being the victim of a cyber attack. In […]

Posted in Cyber Security News | Comments Off on Why Cyber Defense in the Power Industry is so Unique

Standardizing Security: Mitigating IoT Cyber Risks

(Part II of an II Part Series) By Daniel Jetton, Vice President of Cyber Services, OBXtek And Carter Simmons, Deputy Program Manager, OBXtek Introduction In the first part of this […]

Posted in Cyber Security News | Comments Off on Standardizing Security: Mitigating IoT Cyber Risks

Over 100 flaws in management and access control systems expose buildings to hack

Security researcher Gjoko Krstic from Applied Risk discovered over 100 vulnerabilities that expose buildings to cyber attacks. Security researcher Gjoko Krstic from Applied Risk discovered over 100 vulnerabilities in management […]

Posted in Cyber Security News | Comments Off on Over 100 flaws in management and access control systems expose buildings to hack

Empower your Kid with Cyber security

Train Your Lil-champ to be a Cyber Warrior By Devin Smith, Marketing Director, ReviewsDir We, as parents always want the best for our kids; we want them to learn everything […]

Posted in Cyber Security News | Comments Off on Empower your Kid with Cyber security

86% of Cyber security Professionals Expect to Move In 2019, there’s One Way to Fight against It

A people first approach to security is critical for success but it seems challenging and sometimes daunting. By Karl Sharman, Vice-President, BeecherMadden Human error is the number one cause of […]

Posted in Cyber Security News | Comments Off on 86% of Cyber security Professionals Expect to Move In 2019, there’s One Way to Fight against It

It’s all about the Logs

Looking into Your Past Will Secure Your Network’s Future By Gary Brown, Principal Consultant/CISO, Mosaic451 We see it repeatedly. The newly installed CISO or CIO installs the latest blinky-box in […]

Posted in Cyber Security News | Comments Off on It’s all about the Logs

The Privileged Account Security and the Internet of Things

By Milica D. Djekic The Internet of Things (IoT) literarily flooded the marketplace and some statistics would suggest that so soon every single person in the world would deal with […]

Posted in Cyber Security News | Comments Off on The Privileged Account Security and the Internet of Things

More than a Buzzword: Survey Reveals Cyber Threat Intelligence Trends

By Corin Imai, Senior Security Advisor, DomainTools Cyber Threat Intelligence (CTI), the collection and analysis of information about current and potential cyber-attacks and attempts, has evolved significantly in recent years. […]

Posted in Cyber Security News | Comments Off on More than a Buzzword: Survey Reveals Cyber Threat Intelligence Trends

Two Steps on – One Step Back

By Milica D. Djekic Repeating is the mother of knowledge, the ancient Latin saying would suggest. Further, the Chinese proverb would tell – Practice leads to great skill or Practice […]

Posted in Cyber Security News | Comments Off on Two Steps on – One Step Back

4 Signs Your Organization is a Good Cyber Attack Target, and What to Do about It

By Nathan Burke, CMO, Axonius By now we’re all well aware of the transformative technologies accelerating across the enterprise today. Trends like cloud, virtualization, BYOD, work-from-home, mobile devices, and IoT […]

Posted in Cyber Security News | Comments Off on 4 Signs Your Organization is a Good Cyber Attack Target, and What to Do about It

The Internet of Things Signal Transmission Challenges

By Milica D. Djekic The Internet of Things (IoT) is a quite fast growing landscape and it’s so important to understand why its safety and security matter. That technology would […]

Posted in Cyber Security News | Comments Off on The Internet of Things Signal Transmission Challenges

Network Traffic Analysis (NTA)

By Timothy Liu, CTO & Co-Founder, Hillstone Networks Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of security solutions that use network communications […]

Posted in Cyber Security News | Comments Off on Network Traffic Analysis (NTA)

LightNeuron, a Turla’s backdoor used to compromise exchange mail servers

Russia-linked APT group Turla has been using a sophisticated backdoor, dubbed LightNeuron, to hijack Microsoft Exchange mail servers. Russia-linked APT group Turla has been using a sophisticated backdoor, dubbed LightNeuron, […]

Posted in Cyber Security News | Comments Off on LightNeuron, a Turla’s backdoor used to compromise exchange mail servers

Zero Trust Security

Security for the Cloud-Native Era By Amir Sharif, Co-founder at Aporeto Cybercrime on the Rise Every day, hackers succeed at gaining access to the well-protected systems. Adversaries are more skilled […]

Posted in Cyber Security News | Comments Off on Zero Trust Security

On Security and Privacy, States Are Taking the Lead

By Andrea Little Limbago, Chief Social Scientist, Virtru When Toyota announced the second data breach of the year, initial signs pointed to the group OceanLotus, a Vietnamese-linked state-sponsored espionage group. […]

Posted in Cyber Security News | Comments Off on On Security and Privacy, States Are Taking the Lead

Phishing Awareness – The More They Know, the Less the Threat

By Matthew Goodwin In this paper, I will be going over what phishing email attacks are and how end-user training can help secure an organization against such attacks. In my […]

Posted in Cyber Security News | Comments Off on Phishing Awareness – The More They Know, the Less the Threat

Reflecting on April Patch Tuesday

Updates This Month from Microsoft, Adobe, Wireshark, Oracle and Opera By Chris Goettl, Director of Product Management, Security, Ivanti Ever wonder why there are so many updates in April? I […]

Posted in Cyber Security News | Comments Off on Reflecting on April Patch Tuesday

Your Security Teams are Destroying Critical Evidence

Why Stopping Siloed Attacks is No Longer Enough By Erik Randall, Security Engineer, Exabeam Gone are the days of smash-and-grab cyberattacks: Cybercrimes are now sophisticated sequences that take place over […]

Posted in Cyber Security News | Comments Off on Your Security Teams are Destroying Critical Evidence

Enterprise Insider Threats on the Rise

New report finds 59 percent of organizations have experienced at least one insider attack in the last 12 months By Rich Campagna, CMO, Bitglass With news of hacking incidents, new […]

Posted in Cyber Security News | Comments Off on Enterprise Insider Threats on the Rise

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X