Monthly Archives: June 2019

Three Cyber Attacks on the Rise According To New Research

By Marc Laliberte, Sr. Security Analyst, WatchGuard Technologies Cybersecurity threats are continuously evolving as attackers constantly vary their methods and tools to sidestep improved cyber defenses. To better understand this […]

Posted in Cyber Security News | Comments Off on Three Cyber Attacks on the Rise According To New Research

Open Source Intelligence (OSINT): Your Public Frenemy

by Roger A. Grimes, Data-Driven Defense Evangelist, KnowBe4 Whenever I think of Sun Microsystems’ CEO Scott McNealy 2008 quote, “You have no privacy. Get over it!” I can’t help but […]

Posted in Cyber Security News | Comments Off on Open Source Intelligence (OSINT): Your Public Frenemy

How Security Automation Mixed With an IT Culture Shift Can Prevent Data Leakage from Misconfigured Servers

By Chris DeRamus, CTO, DivvyCloud In 2018, misconfigured AWS S3 servers accounted for multiple data breaches across a wide span of industries from companies including Voxox, Pocket iNet, Arik Air, […]

Posted in Cyber Security News | Comments Off on How Security Automation Mixed With an IT Culture Shift Can Prevent Data Leakage from Misconfigured Servers

The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them

By Bob Flores, President, and CEO of Applicology, and Former CTO of the Central In the world of cyber espionage and nation-state hacking, backdoor software vulnerabilities are often thought of […]

Posted in Cyber Security News | Comments Off on The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them

Ways to Protect the System from Cyber Ransomware Attack

By Duncan Kingori, Ways to Protect the System from Cyber Ransomware Attack, Ottomatik.io Ransomware is a common malicious malware that attacks a computer when least expected. Cybercriminals spread ransomware and […]

Posted in Cyber Security News | Comments Off on Ways to Protect the System from Cyber Ransomware Attack

Tens of Million patients impacted by the AMCA data breach

Recovery agency for patient collections American Medical Collection Agency (AMCA) suffered a data breach that could impact many of its customers. American Medical Collection Agency (AMCA) suffered a data breach […]

Posted in Cyber Security News | Comments Off on Tens of Million patients impacted by the AMCA data breach

Making Actual Private Networks A Reality

By Brian Penny, Co-Owner, Encrypted Sensors Virtual private networks (VPNs) have long been considered the bread-and-butter of enterprise security. VPNs were designed to funnel all user traffic through an encrypted, […]

Posted in Cyber Security News | Comments Off on Making Actual Private Networks A Reality

The Difference between Consumer and Enterprise VPNs

By Julian Weinberger, CISSP, Director of Systems Engineering for NCP engineering. Data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them […]

Posted in Cyber Security News | Comments Off on The Difference between Consumer and Enterprise VPNs

Get Cyber Resilient! Join Kevin Mitnick’s Live Webinar on OSINT and How it’s Used Against You

Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world’s most famous hacker and KnowBe4’s Chief Hacking Officer, knows. The […]

Posted in Cyber Security News | Comments Off on Get Cyber Resilient! Join Kevin Mitnick’s Live Webinar on OSINT and How it’s Used Against You

Will U.S. Citizens Wait for a Federal Data Privacy Regulation?

May 25, 2019, will mark one year since the European Union’s General Data Protection Regulation (GDPR) went into effect and many businesses still feel that it has complicated the digital […]

Posted in Cyber Security News | Comments Off on Will U.S. Citizens Wait for a Federal Data Privacy Regulation?

The ‘BlueKeep’ Vulnerability: Keeping Your Systems Secure

On May 14th, 2019 Microsoft issued a patch against the so-called BlueKeep vulnerability, which is also known as CVE-2019-0708. The patch fixes a critical Remote Code Execution vulnerability. According to Microsoft: […]

Posted in Cyber Security News | Comments Off on The ‘BlueKeep’ Vulnerability: Keeping Your Systems Secure

What to Pay for Cybersecurity Professionals?

The increase in salaries is more dramatic this year, as companies fight each other for talent By Karl Sharman, Vice-President, BeecherMadden With 16 states banning salary history information for future […]

Posted in Cyber Security News | Comments Off on What to Pay for Cybersecurity Professionals?

Improving Cyber security Intrusion Detection

By Sidney Smith, Computer Scientist, CCDC Army Research Laboratory With billions of people affected by data breaches last year, cybersecurity has become one of the nation’s top security concerns and […]

Posted in Cyber Security News | Comments Off on Improving Cyber security Intrusion Detection

Ransomware: Are We Really Prepared For Cyber-Attacks?

By Timothy Liu, CTO & Co-Founder, Hillstone Networks On Black Friday of 2018, a powerful ransomware attack hit the San Francisco light rail system, threatening to destroy more than 30 […]

Posted in Cyber Security News | Comments Off on Ransomware: Are We Really Prepared For Cyber-Attacks?

The Pros and Cons of Open Source Managed File Transfer Software

Nowadays with how much sensitive data is needing to be shuffled around between businesses, it’s coming to the time for many companies to implement a managed file transfer (MFT) solution. […]

Posted in Cyber Security News, Featured | Comments Off on The Pros and Cons of Open Source Managed File Transfer Software

ProtonMail denies that it spies on users for government agencies

The popular privacy-focused email service ProtonMail has been accused of offering voluntarily real-time surveillance assistance to law enforcement. The popular privacy-focused email service ProtonMail made the headlines because it has […]

Posted in Cyber Security News | Comments Off on ProtonMail denies that it spies on users for government agencies

Collecting Threat Intelligence in Cyber Defense

by Milica D. Djekic Cyber defense is an area that has found its applications all over the globe. In the most recent past, when we said cyber – we would […]

Posted in Cyber Security News | Comments Off on Collecting Threat Intelligence in Cyber Defense

Threat and Incident Response – Closing the Loop in Cyber Defense

By Timothy Liu, CTO & Co-Founder, Hillstone Networks Two of the Gartner’s 2019 top 10 security projects involve threat detection response and incident response. This highlights the importance of remediation […]

Posted in Cyber Security News | Comments Off on Threat and Incident Response – Closing the Loop in Cyber Defense

By The Numbers: Defining Risk in Cyber Insurance

By Matthew Mckenna, VP EMEA at SecurityScorecard As organizations continue to adjust to the reality of the threat presented by cyber attacks, one of the most important factors has been […]

Posted in Cyber Security News | Comments Off on By The Numbers: Defining Risk in Cyber Insurance

Addressing Challenges in Hybrid Cloud Security

Request Your Free Report Now: “Addressing Challenges in Hybrid Cloud Security“ How can you secure your apps and services without compromising your schedule? (Hint: It’s all in the automation.) Enterprises […]

Posted in Cyber Security News | Comments Off on Addressing Challenges in Hybrid Cloud Security

2019 Threat Detection Report

Request Your Free Report Now: “2019 Threat Detection Report“ An in-depth look at the top MITRE ATT&CK™ techniques. Whether you’re just getting started with ATT&CK or working to improve detection […]

Posted in Cyber Security News | Comments Off on 2019 Threat Detection Report

One Phish, Two Phish, Three Phish, Fraud Phish

Request Your Free eBook Now: “One Phish, Two Phish, Three Phish, Fraud Phish“ From there to here,from here to there, types of fraud are everywhere. Fraud is responsible for billions […]

Posted in Cyber Security News | Comments Off on One Phish, Two Phish, Three Phish, Fraud Phish

8 Real World Use Cases for SOAR e-book

Request Your Free eBook Now: “8 Real World Use Cases for SOAR e-book“ Less than 1 percent of critical security alarms are ever investigated. Automate 80-90 percent of your team’s […]

Posted in Cyber Security News | Comments Off on 8 Real World Use Cases for SOAR e-book

Five Cyber Security Best Practices to Follow

It is estimated that businesses will be shelving out an estimated $11.5 billion in expenses due to ransomware in 2019. Cyber-attacks are occurring with increasing alacrity this year, one on […]

Posted in Cyber Security News, Featured | Comments Off on Five Cyber Security Best Practices to Follow

Cyber Security Facts and States For 2019

By Janny Thomas, Technical Content Writer The most touted term in recent years, cybersecurity isn’t going to die soon. In fact, people are more aware of advanced security mechanism they […]

Posted in Cyber Security News | Comments Off on Cyber Security Facts and States For 2019

Why You Should Always Use A VPN When Connected To Public Wi-Fi

By Katherine Barnett, Digital Rights & Cybersecurity Researcher, Top10VPN.com Having an internet connection is a necessary part of both our personal and working lives. As well as keeping us connected […]

Posted in Cyber Security News | Comments Off on Why You Should Always Use A VPN When Connected To Public Wi-Fi

Departing Employees: A Bigger Threat than Hackers

By Brian Schrader, Esq., president, and CEO, BIA Staff retention is perpetually on the minds of many employers, but maybe a more pressing concern for them should be data retention. […]

Posted in Cyber Security News | Comments Off on Departing Employees: A Bigger Threat than Hackers

Safeguarding Your Organization from Attacks via Your Third-Party Vendors

By Morey Haber, Chief Technology Officer & Chief Information Security Officer, BeyondTrust Realizing that most large organizations today have sophisticated security defences, bad actors are beginning to target third-party vendors, […]

Posted in Cyber Security News | Comments Off on Safeguarding Your Organization from Attacks via Your Third-Party Vendors

Why Federal Agencies Need AIOps

By Jim DeBardi, CIO, and Justin Long, Sr Systems Administrator, NetCentrics Federal government Security Operations Center (SOC) and Network Operations Center (NOC) teams are overwhelmed with tools. Dozens, even hundreds […]

Posted in Cyber Security News | Comments Off on Why Federal Agencies Need AIOps

WMD vs. Cyber Attacks: Similarities Suggesting a Cyber Arms Race

Similarities between a cyber-attack and a WMD attack push countries into a cyber arms race like the one between the U.S. and the U.S.S.R. during the Cold War. By Julien […]

Posted in Cyber Security News | Comments Off on WMD vs. Cyber Attacks: Similarities Suggesting a Cyber Arms Race

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X