Monthly Archives: May 2019
Cutting Through the Hype-The Realistic Flaws of a Zero Trust Security Model
By Morey J. Haber, CTO, BeyondTrust A zero-trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is relevant today since technologies and processes […]
New MegaCortex Ransomware targets enterprise networks
Experts at security firm Sophos discovered a new strain of ransomware dubbed MegaCortex that is targeting corporate networks. Security experts at Sophos discovered a new piece of ransomware dubbed MegaCortex […]
Backups like The Last Resort
The importance of backups within organization landscape. By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca-informatica.pt Today we live in an age where technology is part of everyday […]
Simplifying Cyber security Deployments with Automation
By Peter Baumbach Security is a whole lot like quantum mechanics. It’s rife with uncertainty and you can’t observe your infrastructure without affecting it. Following this analogy, it’s vital to […]
The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them
by Bob Flores, President and CEO of Applicology, and Former CTO of the Central Intelligence Agency In the world of cyber espionage and nation-state hacking, backdoor software vulnerabilities are often […]
Block chain and Cyber Security: Wary Courtship,Or Marriage Made in Heaven?
By Dr. Kevin Harris, Program Director, Information Systems Security, and Information Technology Management, American Public University System For the last several years, perhaps the hottest technology – certainly the one […]
SOAR: The Key to Building a Trustworthy Iot
By Cody Cornell, founder CEO, Swimlane and Trent Hein, co-CEO, Rule4 Gadgets and devices connected through the internet of things (IoT) are infiltrating every aspect of our daily lives. From […]
8 Cyber security Practices In Health IT Domain That Every Company Should Learn From
Exploring the Cyber Vulnerabilities in Digitized Healthcare Space & Finding the Ways to Fix Them By Anubhuti Shrivastava, Content Crafter, Arkenea Cybersecurity is a shared responsibility, and it boils down […]
Making Cybersecurity Risk Measurable – The Future is Here!
2nd Annual FAIR Breakfast at National Harbor – June 18, 2019 Join us in National Harbor on Tuesday, June 18 for our free annual summer Breakfast Meeting. Join a distinguished […]
5 Reasons Why Cloud Security Is Important For All Businesses
With practically every business running on some kind of a cloud network and database, securing the cloud has never been more important, here are the most important reasons why. By […]
Covering Security from Every Angle
By Craig Riddell, senior solutions architect, SSH Communications Security The Agile framework is most often thought of with respect to application development. However, there is now the concept of Agile […]
In Today’s Threat Landscape, Choose an Ounce of Prevention rather Than a Pound of Detection
By Joe Saunders, runsafe Security CEO Cybercrime is on the rise and becoming one of the biggest threats to business operations and continuity. While many cybersecurity companies continue to focus […]
New Regulations Governing Data Protection – Including the Use of Encryption – Now In Effect In The EU And New York State
By Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology Even in a divided, conflicted world, there is one thing everyone can pretty much agree: security breaches and cybersecurity issues […]
Facebook Extends a Privacy Olive Branch to Users
By Dan Goldstein and Jill Messinger Data privacy is a big issue today. Just a few weeks ago, cable news pundits were breathlessly describing the wide-ranging impact of the Cambridge […]
Five Red Flags You Have a Cyber Security Insights Problem
By Nik Whitfield, CEO, Panaseer Red flag one: your board, its regulators, and even auditors want continual reporting Cybersecurity has hit the board-room and above with a splash. In years […]
DDOS attack evolution: the power of UDP amplification
By Corey Nachreiner, CISSP, CTO at WatchGuard Technologies Over the past three years, distributed denial of service (DDoS) attacks has grown significantly both in quantity and scale, breaking bandwidth records […]
Virtual Private Networks: Checking, Tracking and Breaking
By Milica D. Djekic Many persons and organizations would try to find ways to protect their internet connections as well as confidential contents using a diverse set of tools. One […]
Deception Technology—Useful Tool or Just More Busywork?
By Tim Roncevich, Partner, CyberGuard Compliance Infosec professionals are losing ground in the war on cybercrime “Cybercrime has surpassed Drug Crime as the largest form of global thievery since 2018 […]
How Security Automation Mixed with an IT Culture Shift can Prevent Data Leakage from Misconfigured Servers
by Chris DeRamus, CTO, DivvyCloud In 2018, misconfigured AWS S3 servers accounted for multiple data breaches across a wide span of industries from companies including Voxox, Pocket iNet, Arik Air, […]
Wake-Up Call For Enterprise Resource Planning Users
A major insider security threat stems from the complexity of ERPS and complicated system security By Jody Paterson, CEO, ERP Maestro Cybercrime has become a top concern for the contemporary […]
Introducing Insider Threat Training – So Critically Important
We’re Thrilled to Share This Exclusive Offer from The Insider Threat Defense Group Whether purposeful or accidental, most breaches are a result of an insider threat. This is a rare […]
Securing Your Code For GDPR Compliance
Building a long-term program By Jeannie Warner, Security Manager, WhiteHat Security Introduction: The deadline for GDPR initial compliance was May 25, 2018, but the directives enforcing Privacy by Design are […]
ElectrumDoSMiner botnet reached 152,000 hosts
Researchers at Malwarebytes are monitoring the evolution of the ElectrumDoSMiner DDoS botnet that reached 152,000 infected hosts. MalwareBytes researchers are closely monitoring attacks against users of the popular Electrum Bitcoin […]
Could Cryptocurrencies Be A Better And More Effective Way Of The Society’s Control?
By Milica D. Djekic Our world is changing at a quite fast pace and sometimes we are not sure if we can cope with all those changes. One technology would […]
USB-Lock-RP Review: Central Control of Device Access to Computers
It’s time to harden your entire network of Windows laptops, desktops and servers. Here’s how… This review is one of a series published by Cyber Defense Media Group (CDMG) to […]
Are We Solving The Right Problem?
By Mac McMillan, CEO, and President of CynergisTek If you do not live and work within the cybersecurity profession, it won’t take much research to find out just how far […]
Iot Environment Compromising Cyber Security
It’s High Time to Explore What Iot I S Offering Cyber-Criminals, Need to Defend. By N Subash Reddy, Cyber Security Research Fellow, Mindmajix Digital revolution has got its roots into […]
Warning Signs for Managing Cyber Security
By Josh Paape In 1997, the NSA attacked the Department of Defense information infrastructures and attempted to breach their network. The attack was codenamed Operation Eligible Receiver 97 and was […]
Signed Malspam campaigns hit Europeans with Multi-Stage JasperLoader
Experts observed several malspam campaigns using signed emails to deliver the GootKit banking Trojan (aka talalpek or Xswkit). Threat actors leverage a multi-stage malware loader tracked as JasperLoader in the […]
One in five android apps have numerous known security flaws
By Tae Jin “TJ” Kang, CEO, Insignary, Inc. Study Finds One in Five of 700 Most Popular Android Apps Have Numerous Known Open Source Security Vulnerabilities IDC estimates that Google’s […]