Monthly Archives: June 2019

Healthcare Data Security

By Milica D. Djekic Anyone using emerging technologies would more or less deal with the data. Data are everywhere around us and what’s important to know – we should care […]

Posted in Cyber Security News | Comments Off on Healthcare Data Security

Knowledge Is Power: Confronting The Intersection Of Digital Transformation And DDOS

By Nilly Assia Digital transformation is sweeping over the enterprise, bringing with it obvious benefits for business, such as the move from CAPEX to OPEX, improved efficiency and unprecedented interconnectedness. […]

Posted in Cyber Security News | Comments Off on Knowledge Is Power: Confronting The Intersection Of Digital Transformation And DDOS

Protecting against Cybersecurity’s Weakest Link: The Human Factor

By Joshua Behar There’s no doubt about it — users pose the greatest danger to cybersecurity in virtually all organizations. As CompTIA’s International Trends in Cybersecurity research concludes, most cybersecurity […]

Posted in Cyber Security News | Comments Off on Protecting against Cybersecurity’s Weakest Link: The Human Factor

Yes, one USB drive can cause HAVOC

By Ruben Lugo of Kingston Technology The wizardry one USB drive can cause and provide. Whether it’s accidentally lost, carelessly left behind or maliciously programmed and placed somewhere, it is […]

Posted in Cyber Security News | Comments Off on Yes, one USB drive can cause HAVOC

A New Class of Cyber Threat: Digital Threats Are Targeting Your Digital Innovation Programs

By Lou Manousos, CEO, RiskIQ Everyone uses the internet, both the good guys and bad guys. In the ongoing chess match between businesses expanding their digital presence and the actors […]

Posted in Cyber Security News | Comments Off on A New Class of Cyber Threat: Digital Threats Are Targeting Your Digital Innovation Programs

Standby Virtual Desktops: The IT Insurance Policy For Mayhem

By Michael Abboud Allstate’s “mayhem” commercials underscore the need to protect yourself and your property from life’s unforeseen mishaps. What will happen to your business operations if a natural disaster […]

Posted in Cyber Security News | Comments Off on Standby Virtual Desktops: The IT Insurance Policy For Mayhem

Browser-based Cryptocurrency Miners

By Shawn Pope Towards the end of 2017, browser-based cryptocurrency mining activity increased significantly. In fact, we saw browser-based cryptocurrency miners hidden inside big- name websites, such as Showtime, Politifact, […]

Posted in Cyber Security News | Comments Off on Browser-based Cryptocurrency Miners

Facial Recognition

Iphones are not the only one with issues By DRP; Cybersecurity Lab Engineer The consumer’s focus, and subsequently manufacturer’s, has been with ease of use for their products. This continues […]

Posted in Cyber Security News | Comments Off on Facial Recognition

Building a Security Operations Center to Reinforce Trust

By Tom Gilheany, portfolio manager for security training and certifications, Cisco Services To succeed in today’s digital economy requires a new level of trust. Digitization is now the way enterprises […]

Posted in Cyber Security News | Comments Off on Building a Security Operations Center to Reinforce Trust

If You Want to Prevent Breaches, Don’t Make These Three Security Mistakes

By Destiny Bertucci, SolarWinds Head Geek™ There’s one thing that the most high-profile security breaches have had in common: they were preventable. Yet, even in the face of increased incidents, […]

Posted in Cyber Security News | Comments Off on If You Want to Prevent Breaches, Don’t Make These Three Security Mistakes

“Feds Bet on A.I. to Fix Uncle Sam’s Cyber Woes”

We have all heard the saying, “don’t bet on the horses,” but What about betting on artificial intelligence? By Emily Garber, MeriTalk According to the recent MeriTalk Cyber AI IQ […]

Posted in Cyber Security News | Comments Off on “Feds Bet on A.I. to Fix Uncle Sam’s Cyber Woes”

Demystifying the Source Code vs. Binary Debate

By Taylor Armerding, security consultant, Synopsys Is exposure to software source code disastrous enough to merit a meltdown? Based on a couple of incidents in the last few weeks, you […]

Posted in Cyber Security News | Comments Off on Demystifying the Source Code vs. Binary Debate

Smart Home Cyber Security

By Matthew James Smart homes are homes connected through the so-called Internet of Things (IoT). They have a number of smart devices and appliances that are connected to the internet, […]

Posted in Cyber Security News | Comments Off on Smart Home Cyber Security

SiteLock Research: Businesses See More Effective Website Attacks in Q4 2017

by Jessica Ortega, SiteLock Throughout 2017, cybercriminals became increasingly sophisticated, expanding their craft to more complex and sneakier malware. In deploying more attacks that flew under the radar of unsuspecting […]

Posted in Cyber Security News | Comments Off on SiteLock Research: Businesses See More Effective Website Attacks in Q4 2017

Don’t let vulnerabilities win: Patch it so it holds

by Jessica Dore When it comes to car maintenance, we know how to keep ourselves safe on the road: have your breaks checked at regular intervals; get an oil change […]

Posted in Cyber Security News | Comments Off on Don’t let vulnerabilities win: Patch it so it holds

How to Take Competitive Advantage Using Machine Learning

By Milica D. Djekic The digital transformation as being the part of the 4th industrial revolution would so deeply evolve the entire technological landscape. There would be some discussions if […]

Posted in Cyber Security News | Comments Off on How to Take Competitive Advantage Using Machine Learning

4 Signs Your Organization Is a Good Cyber Attack Target, And What to Do About It

By Nathan Burke, CMO, Axonius By now we’re all well aware of the transformative technologies accelerating across the enterprise today. Trends like cloud, virtualization, BYOD, work-from-home, mobile devices, and IoT […]

Posted in Cyber Security News | Comments Off on 4 Signs Your Organization Is a Good Cyber Attack Target, And What to Do About It

Network Security Using Honeypots and Deception Technologies

By Milica D. Djekic The private computers, as well as computer’s networks, are the assets that could get equally used in the everyday life and business environment, so far. So […]

Posted in Cyber Security News | Comments Off on Network Security Using Honeypots and Deception Technologies

AV + EDR versus aiSIEM: Good Security is NOT Good Enough

by Sunil Kotagiri and Arun Gandhi With the adoption and proliferation of Internet of Things (IoT) and cloud/virtualization trends are on the rise, cybercrime is developing much faster. The threat […]

Posted in Cyber Security News | Comments Off on AV + EDR versus aiSIEM: Good Security is NOT Good Enough

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. Technology continues to evolve, and cyber attackers adapt and develop new malicious tools and techniques. There’s no magic solution, but there are a handful of things you […]

Posted in Cyber Security News | Comments Off on 5 Keys to Improve Your Cybersecurity

You’re Guide to Encrypting Files in Linux

If your organization is one of the many that uses Linux operating systems to run key business processes, it’s important to implement the tried-and-true, successfully tested Linux security practices that […]

Posted in Cyber Security News | Comments Off on You’re Guide to Encrypting Files in Linux

The Foundation Common to Most Security Frameworks: Addressing Configuration Controls

We have entered the era of multiple security frameworks.  Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing IT […]

Posted in Cyber Security News | Comments Off on The Foundation Common to Most Security Frameworks: Addressing Configuration Controls

Is Your Business Cyber Resilient?

By Philip S. Renaud, II, MS, CPCU, Executive Director, the Risk Institute Malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016, according to a recent report from […]

Posted in Cyber Security News | Comments Off on Is Your Business Cyber Resilient?

Mitigating the Risks of Multi-Cloud

By Claude Schuck, regional head, Middle East at Veeam The ways businesses leverage the cloud to manage and maximize the value of their data continue to evolve. The years when […]

Posted in Cyber Security News | Comments Off on Mitigating the Risks of Multi-Cloud

The Digital Promised Land is Riddled with Risk

By Reuven Harrison, CTO, and co-founder, Tufin As technology continues to reshape business, organizations globally are embracing the digital age to drive growth, operate more efficiently and advance above the […]

Posted in Cyber Security News | Comments Off on The Digital Promised Land is Riddled with Risk

Don’t Let a Data Breach Cost You $1.4 Billion

By Randy Reiter, CEO, Sql Power Tools On May 13, 2019, Bank Info Security reported that Equifax’s 2017 data breach cost Equifax $1.4 billion per their latest Security and Exchange […]

Posted in Cyber Security News | Comments Off on Don’t Let a Data Breach Cost You $1.4 Billion

A Vision for Cybersecurity 2019

Relying on Actionable Intelligence to Thwart Emerging Cyber Threats By Gene Yoo, Chief Executive Officer, Resecurity Cyberspace has long been an incubator from which security threats arise, but more and […]

Posted in Cyber Security News | Comments Off on A Vision for Cybersecurity 2019

Security for Your Holidays

Tips for the Holidays — Go insecurity! By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca informatica.pt Holidays usually mark the absence of the office, but they are […]

Posted in Cyber Security News | Comments Off on Security for Your Holidays

Proxy vs. API CASB: An Overlooked Choice in Cloud Security

Choosing The Right Cabs Architecture Is Critical In Securing Your Company’s Data By Katie Fritchen, Director of Content Marketing, ManagedMethods The availability of cloud computing and SaaS applications have pushed […]

Posted in Cyber Security News | Comments Off on Proxy vs. API CASB: An Overlooked Choice in Cloud Security

Cybersecurity Jobs in the Private vs. Public Sector

Which Is Right for You? By Leo Taddeo, Chief Information Security Officer, Cyxtera It’s a good time to be a cybersecurity professional. Private and public enterprises increasingly recognize the need […]

Posted in Cyber Security News | Comments Off on Cybersecurity Jobs in the Private vs. Public Sector

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X