Monthly Archives: May 2019

Cutting Through the Hype-The Realistic Flaws of a Zero Trust Security Model

By Morey J. Haber, CTO, BeyondTrust A zero-trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is relevant today since technologies and processes […]

Posted in Cyber Security News | Comments Off on Cutting Through the Hype-The Realistic Flaws of a Zero Trust Security Model

New MegaCortex Ransomware targets enterprise networks

Experts at security firm Sophos discovered a new strain of ransomware dubbed MegaCortex that is targeting corporate networks. Security experts at Sophos discovered a new piece of ransomware dubbed MegaCortex […]

Posted in Cyber Security News | Comments Off on New MegaCortex Ransomware targets enterprise networks

Backups like The Last Resort

The importance of backups within organization landscape. By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Today we live in an age where technology is part of everyday […]

Posted in Cyber Security News | Comments Off on Backups like The Last Resort

Simplifying Cyber security Deployments with Automation

By Peter Baumbach Security is a whole lot like quantum mechanics. It’s rife with uncertainty and you can’t observe your infrastructure without affecting it. Following this analogy, it’s vital to […]

Posted in Cyber Security News | Comments Off on Simplifying Cyber security Deployments with Automation

The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them

by Bob Flores, President and CEO of Applicology, and Former CTO of the Central Intelligence Agency In the world of cyber espionage and nation-state hacking, backdoor software vulnerabilities are often […]

Posted in Cyber Security News | Comments Off on The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them

Block chain and Cyber Security: Wary Courtship,Or Marriage Made in Heaven?

By Dr. Kevin Harris, Program Director, Information Systems Security, and Information Technology Management, American Public University System For the last several years, perhaps the hottest technology – certainly the one […]

Posted in Cyber Security News | Comments Off on Block chain and Cyber Security: Wary Courtship,Or Marriage Made in Heaven?

SOAR: The Key to Building a Trustworthy Iot

By Cody Cornell, founder CEO, Swimlane and Trent Hein, co-CEO, Rule4 Gadgets and devices connected through the internet of things (IoT) are infiltrating every aspect of our daily lives. From […]

Posted in Cyber Security News | Comments Off on SOAR: The Key to Building a Trustworthy Iot

8 Cyber security Practices In Health IT Domain That Every Company Should Learn From

Exploring the Cyber Vulnerabilities in Digitized Healthcare Space & Finding the Ways to Fix Them By Anubhuti Shrivastava, Content Crafter, Arkenea Cybersecurity is a shared responsibility, and it boils down […]

Posted in Cyber Security News | Comments Off on 8 Cyber security Practices In Health IT Domain That Every Company Should Learn From

Making Cybersecurity Risk Measurable – The Future is Here!

2nd Annual FAIR Breakfast at National Harbor – June 18, 2019 Join us in National Harbor on Tuesday, June 18 for our free annual summer Breakfast Meeting. Join a distinguished […]

Posted in Cyber Security News | Comments Off on Making Cybersecurity Risk Measurable – The Future is Here!

5 Reasons Why Cloud Security Is Important For All Businesses

With practically every business running on some kind of a cloud network and database, securing the cloud has never been more important, here are the most important reasons why. By […]

Posted in Cyber Security News | Comments Off on 5 Reasons Why Cloud Security Is Important For All Businesses

Covering Security from Every Angle

By Craig Riddell, senior solutions architect, SSH Communications Security The Agile framework is most often thought of with respect to application development. However, there is now the concept of Agile […]

Posted in Cyber Security News | Comments Off on Covering Security from Every Angle

In Today’s Threat Landscape, Choose an Ounce of Prevention rather Than a Pound of Detection

By Joe Saunders, runsafe Security CEO Cybercrime is on the rise and becoming one of the biggest threats to business operations and continuity. While many cybersecurity companies continue to focus […]

Posted in Cyber Security News | Comments Off on In Today’s Threat Landscape, Choose an Ounce of Prevention rather Than a Pound of Detection

New Regulations Governing Data Protection – Including the Use of Encryption – Now In Effect In The EU And New York State

By Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology Even in a divided, conflicted world, there is one thing everyone can pretty much agree: security breaches and cybersecurity issues […]

Posted in Cyber Security News | Comments Off on New Regulations Governing Data Protection – Including the Use of Encryption – Now In Effect In The EU And New York State

Facebook Extends a Privacy Olive Branch to Users

By Dan Goldstein and Jill Messinger Data privacy is a big issue today. Just a few weeks ago, cable news pundits were breathlessly describing the wide-ranging impact of the Cambridge […]

Posted in Cyber Security News | Comments Off on Facebook Extends a Privacy Olive Branch to Users

Five Red Flags You Have a Cyber Security Insights Problem

By Nik Whitfield, CEO, Panaseer Red flag one: your board, its regulators, and even auditors want continual reporting Cybersecurity has hit the board-room and above with a splash. In years […]

Posted in Cyber Security News | Comments Off on Five Red Flags You Have a Cyber Security Insights Problem

DDOS attack evolution: the power of UDP amplification

By Corey Nachreiner, CISSP, CTO at WatchGuard Technologies Over the past three years, distributed denial of service (DDoS) attacks has grown significantly both in quantity and scale, breaking bandwidth records […]

Posted in Cyber Security News | Comments Off on DDOS attack evolution: the power of UDP amplification

Virtual Private Networks: Checking, Tracking and Breaking

By Milica D. Djekic Many persons and organizations would try to find ways to protect their internet connections as well as confidential contents using a diverse set of tools. One […]

Posted in Cyber Security News | Comments Off on Virtual Private Networks: Checking, Tracking and Breaking

Deception Technology—Useful Tool or Just More Busywork?

By Tim Roncevich, Partner, CyberGuard Compliance Infosec professionals are losing ground in the war on cybercrime “Cybercrime has surpassed Drug Crime as the largest form of global thievery since 2018 […]

Posted in Cyber Security News | Comments Off on Deception Technology—Useful Tool or Just More Busywork?

How Security Automation Mixed with an IT Culture Shift can Prevent Data Leakage from Misconfigured Servers

by Chris DeRamus, CTO, DivvyCloud In 2018, misconfigured AWS S3 servers accounted for multiple data breaches across a wide span of industries from companies including Voxox, Pocket iNet, Arik Air, […]

Posted in Cyber Security News | Comments Off on How Security Automation Mixed with an IT Culture Shift can Prevent Data Leakage from Misconfigured Servers

Wake-Up Call For Enterprise Resource Planning Users

A major insider security threat stems from the complexity of ERPS and complicated system security By Jody Paterson, CEO, ERP Maestro Cybercrime has become a top concern for the contemporary […]

Posted in Cyber Security News | Comments Off on Wake-Up Call For Enterprise Resource Planning Users

Introducing Insider Threat Training – So Critically Important

We’re Thrilled to Share This Exclusive Offer from The Insider Threat Defense Group Whether purposeful or accidental, most breaches are a result of an insider threat. This is a rare […]

Posted in Cyber Security News | Comments Off on Introducing Insider Threat Training – So Critically Important

Securing Your Code For GDPR Compliance

Building a  long-term program By Jeannie Warner, Security Manager, WhiteHat Security Introduction: The deadline for GDPR initial compliance was May 25, 2018, but the directives enforcing Privacy by Design are […]

Posted in Cyber Security News | Comments Off on Securing Your Code For GDPR Compliance

ElectrumDoSMiner botnet reached 152,000 hosts

Researchers at Malwarebytes are monitoring the evolution of the ElectrumDoSMiner DDoS botnet that reached 152,000 infected hosts. MalwareBytes researchers are closely monitoring attacks against users of the popular Electrum Bitcoin […]

Posted in Cyber Security News | Comments Off on ElectrumDoSMiner botnet reached 152,000 hosts

Could Cryptocurrencies Be A Better And More Effective Way Of The Society’s Control?

By Milica D. Djekic Our world is changing at a quite fast pace and sometimes we are not sure if we can cope with all those changes. One technology would […]

Posted in Cyber Security News | Comments Off on Could Cryptocurrencies Be A Better And More Effective Way Of The Society’s Control?

USB-Lock-RP Review: Central Control of Device Access to Computers

It’s time to harden your entire network of Windows laptops, desktops and servers.  Here’s how… This review is one of a series published by Cyber Defense Media Group (CDMG) to […]

Posted in Cyber Security News | Comments Off on USB-Lock-RP Review: Central Control of Device Access to Computers

Are We Solving The Right Problem?

By Mac McMillan, CEO, and President of CynergisTek If you do not live and work within the cybersecurity profession, it won’t take much research to find out just how far […]

Posted in Cyber Security News | Comments Off on Are We Solving The Right Problem?

Iot Environment Compromising Cyber Security

It’s High Time to Explore What Iot I S Offering Cyber-Criminals, Need to Defend. By N Subash Reddy, Cyber Security Research Fellow, Mindmajix Digital revolution has got its roots into […]

Posted in Cyber Security News | Comments Off on Iot Environment Compromising Cyber Security

Warning Signs for Managing Cyber Security

By Josh Paape In 1997, the NSA attacked the Department of Defense information infrastructures and attempted to breach their network. The attack was codenamed Operation Eligible Receiver 97 and was […]

Posted in Cyber Security News | Comments Off on Warning Signs for Managing Cyber Security

Signed Malspam campaigns hit Europeans with Multi-Stage JasperLoader

Experts observed several malspam campaigns using signed emails to deliver the GootKit banking Trojan (aka talalpek or Xswkit). Threat actors leverage a multi-stage malware loader tracked as JasperLoader in the […]

Posted in Cyber Security News | Comments Off on Signed Malspam campaigns hit Europeans with Multi-Stage JasperLoader

One in five android apps have numerous known security flaws

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. Study Finds One in Five of 700 Most Popular Android Apps Have Numerous Known Open Source Security Vulnerabilities IDC estimates that Google’s […]

Posted in Cyber Security News | Comments Off on One in five android apps have numerous known security flaws

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X