Monthly Archives: June 2019
Three Cyber Attacks on the Rise According To New Research
By Marc Laliberte, Sr. Security Analyst, WatchGuard Technologies Cybersecurity threats are continuously evolving as attackers constantly vary their methods and tools to sidestep improved cyber defenses. To better understand this […]
Open Source Intelligence (OSINT): Your Public Frenemy
by Roger A. Grimes, Data-Driven Defense Evangelist, KnowBe4 Whenever I think of Sun Microsystems’ CEO Scott McNealy 2008 quote, “You have no privacy. Get over it!” I can’t help but […]
How Security Automation Mixed With an IT Culture Shift Can Prevent Data Leakage from Misconfigured Servers
By Chris DeRamus, CTO, DivvyCloud In 2018, misconfigured AWS S3 servers accounted for multiple data breaches across a wide span of industries from companies including Voxox, Pocket iNet, Arik Air, […]
The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them
By Bob Flores, President, and CEO of Applicology, and Former CTO of the Central In the world of cyber espionage and nation-state hacking, backdoor software vulnerabilities are often thought of […]
Ways to Protect the System from Cyber Ransomware Attack
By Duncan Kingori, Ways to Protect the System from Cyber Ransomware Attack, Ottomatik.io Ransomware is a common malicious malware that attacks a computer when least expected. Cybercriminals spread ransomware and […]
Tens of Million patients impacted by the AMCA data breach
Recovery agency for patient collections American Medical Collection Agency (AMCA) suffered a data breach that could impact many of its customers. American Medical Collection Agency (AMCA) suffered a data breach […]
Making Actual Private Networks A Reality
By Brian Penny, Co-Owner, Encrypted Sensors Virtual private networks (VPNs) have long been considered the bread-and-butter of enterprise security. VPNs were designed to funnel all user traffic through an encrypted, […]
The Difference between Consumer and Enterprise VPNs
By Julian Weinberger, CISSP, Director of Systems Engineering for NCP engineering. Data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them […]
Get Cyber Resilient! Join Kevin Mitnick’s Live Webinar on OSINT and How it’s Used Against You
Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world’s most famous hacker and KnowBe4’s Chief Hacking Officer, knows. The […]
Will U.S. Citizens Wait for a Federal Data Privacy Regulation?
May 25, 2019, will mark one year since the European Union’s General Data Protection Regulation (GDPR) went into effect and many businesses still feel that it has complicated the digital […]
The ‘BlueKeep’ Vulnerability: Keeping Your Systems Secure
On May 14th, 2019 Microsoft issued a patch against the so-called BlueKeep vulnerability, which is also known as CVE-2019-0708. The patch fixes a critical Remote Code Execution vulnerability. According to Microsoft: […]
What to Pay for Cybersecurity Professionals?
The increase in salaries is more dramatic this year, as companies fight each other for talent By Karl Sharman, Vice-President, BeecherMadden With 16 states banning salary history information for future […]
Improving Cyber security Intrusion Detection
By Sidney Smith, Computer Scientist, CCDC Army Research Laboratory With billions of people affected by data breaches last year, cybersecurity has become one of the nation’s top security concerns and […]
Ransomware: Are We Really Prepared For Cyber-Attacks?
By Timothy Liu, CTO & Co-Founder, Hillstone Networks On Black Friday of 2018, a powerful ransomware attack hit the San Francisco light rail system, threatening to destroy more than 30 […]
The Pros and Cons of Open Source Managed File Transfer Software
Nowadays with how much sensitive data is needing to be shuffled around between businesses, it’s coming to the time for many companies to implement a managed file transfer (MFT) solution. […]
ProtonMail denies that it spies on users for government agencies
The popular privacy-focused email service ProtonMail has been accused of offering voluntarily real-time surveillance assistance to law enforcement. The popular privacy-focused email service ProtonMail made the headlines because it has […]
Collecting Threat Intelligence in Cyber Defense
by Milica D. Djekic Cyber defense is an area that has found its applications all over the globe. In the most recent past, when we said cyber – we would […]
Threat and Incident Response – Closing the Loop in Cyber Defense
By Timothy Liu, CTO & Co-Founder, Hillstone Networks Two of the Gartner’s 2019 top 10 security projects involve threat detection response and incident response. This highlights the importance of remediation […]
By The Numbers: Defining Risk in Cyber Insurance
By Matthew Mckenna, VP EMEA at SecurityScorecard As organizations continue to adjust to the reality of the threat presented by cyber attacks, one of the most important factors has been […]
Addressing Challenges in Hybrid Cloud Security
Request Your Free Report Now: “Addressing Challenges in Hybrid Cloud Security“ How can you secure your apps and services without compromising your schedule? (Hint: It’s all in the automation.) Enterprises […]
2019 Threat Detection Report
Request Your Free Report Now: “2019 Threat Detection Report“ An in-depth look at the top MITRE ATT&CK™ techniques. Whether you’re just getting started with ATT&CK or working to improve detection […]
One Phish, Two Phish, Three Phish, Fraud Phish
Request Your Free eBook Now: “One Phish, Two Phish, Three Phish, Fraud Phish“ From there to here,from here to there, types of fraud are everywhere. Fraud is responsible for billions […]
8 Real World Use Cases for SOAR e-book
Request Your Free eBook Now: “8 Real World Use Cases for SOAR e-book“ Less than 1 percent of critical security alarms are ever investigated. Automate 80-90 percent of your team’s […]
Five Cyber Security Best Practices to Follow
It is estimated that businesses will be shelving out an estimated $11.5 billion in expenses due to ransomware in 2019. Cyber-attacks are occurring with increasing alacrity this year, one on […]
Cyber Security Facts and States For 2019
By Janny Thomas, Technical Content Writer The most touted term in recent years, cybersecurity isn’t going to die soon. In fact, people are more aware of advanced security mechanism they […]
Why You Should Always Use A VPN When Connected To Public Wi-Fi
By Katherine Barnett, Digital Rights & Cybersecurity Researcher, Top10VPN.com Having an internet connection is a necessary part of both our personal and working lives. As well as keeping us connected […]
Departing Employees: A Bigger Threat than Hackers
By Brian Schrader, Esq., president, and CEO, BIA Staff retention is perpetually on the minds of many employers, but maybe a more pressing concern for them should be data retention. […]
Safeguarding Your Organization from Attacks via Your Third-Party Vendors
By Morey Haber, Chief Technology Officer & Chief Information Security Officer, BeyondTrust Realizing that most large organizations today have sophisticated security defences, bad actors are beginning to target third-party vendors, […]
Why Federal Agencies Need AIOps
By Jim DeBardi, CIO, and Justin Long, Sr Systems Administrator, NetCentrics Federal government Security Operations Center (SOC) and Network Operations Center (NOC) teams are overwhelmed with tools. Dozens, even hundreds […]
WMD vs. Cyber Attacks: Similarities Suggesting a Cyber Arms Race
Similarities between a cyber-attack and a WMD attack push countries into a cyber arms race like the one between the U.S. and the U.S.S.R. during the Cold War. By Julien […]