Monthly Archives: July 2019
Equifax Breach & Why Your Company is Next
The Hybrid Cloud Data Center Paradigm Shift That Leaves Security Behind By Dave Klein, Senior Director of Engineering & Architecture, GuardiCore When the Equifax breach was announced on September 7th, […]
Digital Certificates 101
The Basics, Sweeping Industry Changes Coming in 2018 and How to Be Prepared for Them By Doug Beattie, vice president of product management, GlobalSign With an incredibly active threat landscape […]
Intelligently Developed Assessment for Cyber Training
By Milica D. Djekic The creation of education and training is a quite trickery job requiring a lot of theoretical as well as practical skills. Right here, we would try […]
3 Takeaways From The Recent WPA2 Vulnerabilities
By Rodney Joffe, Senior VP, Senior Technologist, and Fellow, Neustar, Inc The recently identified KRACK (Key Reinstallation Attacks) vulnerabilities have shown clearly that the Wi-Fi we trust is not as […]
What You Need To Know About Anti Phishing Standards Part 1
By Marc Laliberte, Information Security Threat Analyst, WatchGuard Technologies Phishing emails are a popular malware delivery vehicle for attackers. In fact, according to Verizon’s 2017 Data Breach Investigations Report, two-thirds […]
Why You Need a Good Head-Hunter to Help Fight Cyber Crime
By Will Bourne – Director – Cognatio Solutions In a market-driven by highly skilled professionals, it’s essential organizations attract the best talent to help fight cybercrime and prevent future breaches. […]
Bio-metric Best Practices
By Rob Douglas In the identity-based world we live in, passwords seem to hold the key to our identities. But with a majority of Americans (64 percent) personally experiencing a […]
‘Tis The Season To Prepare Your E-Commerce Business To Effectively Fight Fraud
By Anna Jones With the holiday shopping season fast approaching, e-commerce companies are once again planning for and preparing to profit from the increasing numbers of shoppers who purchase their […]
Cyber Resilience in 2019: What to Watch
By Anthony J. Ferrante, Senior Managing Director & Head of Cybersecurity, FTI Consulting A report from Lloyd’s of London recently claimed that a global cyber attack could result in up […]
A New Approach to Harnessing Machine Learning For Security
By Sarosh Petkar, Malware Analyst, Barkly For years, we’ve heard the same things over and over again about the challenge of cybersecurity. Attackers will always be one step ahead of […]
Digital Certificates
The basics, sweeping industry changes coming in 2018 and how to be prepared for them By Doug Beattie, vice president of product management, GlobalSign With an incredibly active threat landscape […]
Enhance Cyber Threat Hunting Through Optical Network Analytics
Cyber intelligence officials need data mining capabilities to track the malicious activity on global transport networks requires By Mike Seidler, Product Marketing Manager, NetQuest Corp. Global optical transport networks have […]
9 Ways CEOS Can Promote Cybersecurity
By Jessica Anderson, Director of PR, phoenixnap Global IT Services The increase in ransomware attacks has created security challenges for companies. CEO roles have expanded to include cybersecurity. As CEO […]
Business Email Compromise (BEC) In Full Force & Effect
Another university’s epic fail By DRP; Cybersecurity Lab Engineer There have been few attacks in the last five years that have been more successful overall and on average than the […]
The Critical Differences between Security Orchestration and Intelligent Automation
By Kumar Saurabh, CEO, and Co-founder, LogicHub Ransomware, IoT attacks, phishing, cloud vulnerabilities—there are plenty of reasons for the increase in SecOps workloads. To reduce this growing burden on security […]
3 Steps to Create a Culture of Cybersecurity
by Mary-Michael Horowitz It seems like every business is trying to improve its company culture. And that’s a good thing. An effective culture is built on solid values and a […]
Securing the Connected and Autonomous Vehicle
Difficult, yet fulfilling By DRP; Cybersecurity Lab Engineer Vehicles have been connected and on the road for years throughout the nation. This has been placed in the various vehicles and […]
How to Defend Your Business against a Ransom Driven DDOS Attack
Responding to the surge in DDoS ransom campaigns By Stephanie Weagle, Vice President, Corero Network Security Since the inception of the internet, hackers have used DDoS attacks as a vehicle […]
Report Reveals that Companies’ Biggest Data Security Threat is … Their Own Employees?
By Walter Fiorentini, Apricorn Cybercriminals are a scourge to every company: the security breaches they execute can inflict considerable damage to an organization’s reputation and bottom line, as well as […]
Could Your Reactive Cyber Security Approach Put You Out Of Business?
By Ajay Unni, Founder and Chief Executive Officer of Stickman Cybersecurity is a concern for businesses of any of size, but it’s especially pressing for smaller companies. That’s because they […]
Surveying Anti-Phishing Standards – Part 2
By Marc Laliberte, Information Security Threat Analyst, WatchGuard Technologies In our last article, we looked at three different technology standards that combat spam and phishing attacks. If you haven’t read […]
Ransomware: Nothing to Sneeze At
By Mike Andrews, Managing Director, NovaStor Corporation We’re heading into the cold season and the common cold is well… common. A trip to the pharmacy presents us with endless options […]
VPN: Do You Really Need It? This Will Help You Decide!
By Amelia Blanche Privacy is an aspect that is increasingly valued when it comes to surfing the Internet but is increasingly difficult to achieve. User data is too valuable for […]
Creep Hunters Canada Society
Collaborates with google developers to hunt online predators By Brendon S Brady, Executive Director, CHCSociety We are happy to announce that in the coming months we will be releasing an […]
How to Make Notpetya Not Your Problem
4 critical steps organizations must take for ransomware defense by Noa Arias, Director of Marketing, Semperis The NotPetya attack took the world by storm when a compromised update of M.E.Doc […]
Does Your Company Have Adequate Security Programs In The Era Of Cyber Attacks?
Many companies have a false sense of confidence about their cybersecurity capabilities By Doug Ramos, Security Practice Manager, Groupware Technology Facing ever-evolving malware, vulnerabilities and hacking attempts, companies today need […]
Intel addresses high severity flaw in Processor Diagnostic Tool
Intel Patch Tuesday updates for July 2019 address a serious flaw in Processor Diagnostic Tool and minor issue in the Solid State Drives (SSD) for Data Centers (DC). Intel’s Patch […]
How to Become a Cyber Security Professional
If you want to switch to a career in cybersecurity, this is how you can get started By Ehtisham Hussain, Content Marketing Manager, QuickStart At the time this article is […]
Lack of Infosec & Devsecops
Roots at the college level By DRP; Cybersecurity Lab Engineer The InfoSec field and industry continue to grow at an outstanding pace. This is being driven by many market forces, […]
Seeing Around Corners: Operatively-Sourced Intel Predicted a Ransomware Outbreak
Operatively-sourced intelligence signaled the rise of petya ransomware as early as January 2017… A game of cyber “cat and mouse” on a global level. By Byron Rashed, Vice President of […]