Monthly Archives: June 2019
Healthcare Data Security
By Milica D. Djekic Anyone using emerging technologies would more or less deal with the data. Data are everywhere around us and what’s important to know – we should care […]
Knowledge Is Power: Confronting The Intersection Of Digital Transformation And DDOS
By Nilly Assia Digital transformation is sweeping over the enterprise, bringing with it obvious benefits for business, such as the move from CAPEX to OPEX, improved efficiency and unprecedented interconnectedness. […]
Protecting against Cybersecurity’s Weakest Link: The Human Factor
By Joshua Behar There’s no doubt about it — users pose the greatest danger to cybersecurity in virtually all organizations. As CompTIA’s International Trends in Cybersecurity research concludes, most cybersecurity […]
Yes, one USB drive can cause HAVOC
By Ruben Lugo of Kingston Technology The wizardry one USB drive can cause and provide. Whether it’s accidentally lost, carelessly left behind or maliciously programmed and placed somewhere, it is […]
A New Class of Cyber Threat: Digital Threats Are Targeting Your Digital Innovation Programs
By Lou Manousos, CEO, RiskIQ Everyone uses the internet, both the good guys and bad guys. In the ongoing chess match between businesses expanding their digital presence and the actors […]
Standby Virtual Desktops: The IT Insurance Policy For Mayhem
By Michael Abboud Allstate’s “mayhem” commercials underscore the need to protect yourself and your property from life’s unforeseen mishaps. What will happen to your business operations if a natural disaster […]
Browser-based Cryptocurrency Miners
By Shawn Pope Towards the end of 2017, browser-based cryptocurrency mining activity increased significantly. In fact, we saw browser-based cryptocurrency miners hidden inside big- name websites, such as Showtime, Politifact, […]
Facial Recognition
Iphones are not the only one with issues By DRP; Cybersecurity Lab Engineer The consumer’s focus, and subsequently manufacturer’s, has been with ease of use for their products. This continues […]
Building a Security Operations Center to Reinforce Trust
By Tom Gilheany, portfolio manager for security training and certifications, Cisco Services To succeed in today’s digital economy requires a new level of trust. Digitization is now the way enterprises […]
If You Want to Prevent Breaches, Don’t Make These Three Security Mistakes
By Destiny Bertucci, SolarWinds Head Geek™ There’s one thing that the most high-profile security breaches have had in common: they were preventable. Yet, even in the face of increased incidents, […]
“Feds Bet on A.I. to Fix Uncle Sam’s Cyber Woes”
We have all heard the saying, “don’t bet on the horses,” but What about betting on artificial intelligence? By Emily Garber, MeriTalk According to the recent MeriTalk Cyber AI IQ […]
Demystifying the Source Code vs. Binary Debate
By Taylor Armerding, security consultant, Synopsys Is exposure to software source code disastrous enough to merit a meltdown? Based on a couple of incidents in the last few weeks, you […]
Smart Home Cyber Security
By Matthew James Smart homes are homes connected through the so-called Internet of Things (IoT). They have a number of smart devices and appliances that are connected to the internet, […]
SiteLock Research: Businesses See More Effective Website Attacks in Q4 2017
by Jessica Ortega, SiteLock Throughout 2017, cybercriminals became increasingly sophisticated, expanding their craft to more complex and sneakier malware. In deploying more attacks that flew under the radar of unsuspecting […]
Don’t let vulnerabilities win: Patch it so it holds
by Jessica Dore When it comes to car maintenance, we know how to keep ourselves safe on the road: have your breaks checked at regular intervals; get an oil change […]
How to Take Competitive Advantage Using Machine Learning
By Milica D. Djekic The digital transformation as being the part of the 4th industrial revolution would so deeply evolve the entire technological landscape. There would be some discussions if […]
4 Signs Your Organization Is a Good Cyber Attack Target, And What to Do About It
By Nathan Burke, CMO, Axonius By now we’re all well aware of the transformative technologies accelerating across the enterprise today. Trends like cloud, virtualization, BYOD, work-from-home, mobile devices, and IoT […]
Network Security Using Honeypots and Deception Technologies
By Milica D. Djekic The private computers, as well as computer’s networks, are the assets that could get equally used in the everyday life and business environment, so far. So […]
AV + EDR versus aiSIEM: Good Security is NOT Good Enough
by Sunil Kotagiri and Arun Gandhi With the adoption and proliferation of Internet of Things (IoT) and cloud/virtualization trends are on the rise, cybercrime is developing much faster. The threat […]
5 Keys to Improve Your Cybersecurity
Cybersecurity isn’t easy. Technology continues to evolve, and cyber attackers adapt and develop new malicious tools and techniques. There’s no magic solution, but there are a handful of things you […]
You’re Guide to Encrypting Files in Linux
If your organization is one of the many that uses Linux operating systems to run key business processes, it’s important to implement the tried-and-true, successfully tested Linux security practices that […]
The Foundation Common to Most Security Frameworks: Addressing Configuration Controls
We have entered the era of multiple security frameworks. Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing IT […]
Is Your Business Cyber Resilient?
By Philip S. Renaud, II, MS, CPCU, Executive Director, the Risk Institute Malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016, according to a recent report from […]
Mitigating the Risks of Multi-Cloud
By Claude Schuck, regional head, Middle East at Veeam The ways businesses leverage the cloud to manage and maximize the value of their data continue to evolve. The years when […]
The Digital Promised Land is Riddled with Risk
By Reuven Harrison, CTO, and co-founder, Tufin As technology continues to reshape business, organizations globally are embracing the digital age to drive growth, operate more efficiently and advance above the […]
Don’t Let a Data Breach Cost You $1.4 Billion
By Randy Reiter, CEO, Sql Power Tools On May 13, 2019, Bank Info Security reported that Equifax’s 2017 data breach cost Equifax $1.4 billion per their latest Security and Exchange […]
A Vision for Cybersecurity 2019
Relying on Actionable Intelligence to Thwart Emerging Cyber Threats By Gene Yoo, Chief Executive Officer, Resecurity Cyberspace has long been an incubator from which security threats arise, but more and […]
Security for Your Holidays
Tips for the Holidays — Go insecurity! By Pedro Tavares, Founder of CSIRT.UBI & Cyber Security Blog seguranca informatica.pt Holidays usually mark the absence of the office, but they are […]
Proxy vs. API CASB: An Overlooked Choice in Cloud Security
Choosing The Right Cabs Architecture Is Critical In Securing Your Company’s Data By Katie Fritchen, Director of Content Marketing, ManagedMethods The availability of cloud computing and SaaS applications have pushed […]
Cybersecurity Jobs in the Private vs. Public Sector
Which Is Right for You? By Leo Taddeo, Chief Information Security Officer, Cyxtera It’s a good time to be a cybersecurity professional. Private and public enterprises increasingly recognize the need […]