Monthly Archives: July 2019

Equifax Breach & Why Your Company is Next

The Hybrid Cloud Data Center Paradigm Shift That Leaves Security Behind By Dave Klein, Senior Director of Engineering & Architecture, GuardiCore When the Equifax breach was announced on September 7th, […]

Posted in Cyber Security News | Comments Off on Equifax Breach & Why Your Company is Next

Digital Certificates 101

The Basics, Sweeping Industry Changes Coming in 2018 and How to Be Prepared for Them By Doug Beattie, vice president of product management, GlobalSign With an incredibly active threat landscape […]

Posted in Cyber Security News | Comments Off on Digital Certificates 101

Intelligently Developed Assessment for Cyber Training

By Milica D. Djekic The creation of education and training is a quite trickery job requiring a lot of theoretical as well as practical skills. Right here, we would try […]

Posted in Cyber Security News | Comments Off on Intelligently Developed Assessment for Cyber Training

3 Takeaways From The Recent WPA2 Vulnerabilities

By Rodney Joffe, Senior VP, Senior Technologist, and Fellow, Neustar, Inc The recently identified KRACK (Key Reinstallation Attacks) vulnerabilities have shown clearly that the Wi-Fi we trust is not as […]

Posted in Cyber Security News | Comments Off on 3 Takeaways From The Recent WPA2 Vulnerabilities

What You Need To Know About Anti Phishing Standards Part 1

By Marc Laliberte, Information Security Threat Analyst, WatchGuard Technologies Phishing emails are a popular malware delivery vehicle for attackers. In fact, according to Verizon’s 2017 Data Breach Investigations Report, two-thirds […]

Posted in Cyber Security News | Comments Off on What You Need To Know About Anti Phishing Standards Part 1

Why You Need a Good Head-Hunter to Help Fight Cyber Crime

By Will Bourne – Director – Cognatio Solutions In a market-driven by highly skilled professionals, it’s essential organizations attract the best talent to help fight cybercrime and prevent future breaches. […]

Posted in Cyber Security News | Comments Off on Why You Need a Good Head-Hunter to Help Fight Cyber Crime

Bio-metric Best Practices

By Rob Douglas In the identity-based world we live in, passwords seem to hold the key to our identities. But with a majority of Americans (64 percent) personally experiencing a […]

Posted in Cyber Security News | Comments Off on Bio-metric Best Practices

‘Tis The Season To Prepare Your E-Commerce Business To Effectively Fight Fraud

By Anna Jones With the holiday shopping season fast approaching, e-commerce companies are once again planning for and preparing to profit from the increasing numbers of shoppers who purchase their […]

Posted in Cyber Security News | Comments Off on ‘Tis The Season To Prepare Your E-Commerce Business To Effectively Fight Fraud

Cyber Resilience in 2019: What to Watch

By Anthony J. Ferrante, Senior Managing Director & Head of Cybersecurity, FTI Consulting A report from Lloyd’s of London recently claimed that a global cyber attack could result in up […]

Posted in Cyber Security News | Comments Off on Cyber Resilience in 2019: What to Watch

A New Approach to Harnessing Machine Learning For Security

By Sarosh Petkar, Malware Analyst, Barkly For years, we’ve heard the same things over and over again about the challenge of cybersecurity. Attackers will always be one step ahead of […]

Posted in Cyber Security News | Comments Off on A New Approach to Harnessing Machine Learning For Security

Digital Certificates

The basics, sweeping industry changes coming in 2018 and how to be prepared for them By Doug Beattie, vice president of product management, GlobalSign With an incredibly active threat landscape […]

Posted in Cyber Security News | Comments Off on Digital Certificates

Enhance Cyber Threat Hunting Through Optical Network Analytics

Cyber intelligence officials need data mining capabilities to track the malicious activity on global transport networks requires By Mike Seidler, Product Marketing Manager, NetQuest Corp. Global optical transport networks have […]

Posted in Cyber Security News | Comments Off on Enhance Cyber Threat Hunting Through Optical Network Analytics

9 Ways CEOS Can Promote Cybersecurity

By Jessica Anderson, Director of PR, phoenixnap Global IT Services The increase in ransomware attacks has created security challenges for companies. CEO roles have expanded to include cybersecurity. As CEO […]

Posted in Cyber Security News | Comments Off on 9 Ways CEOS Can Promote Cybersecurity

Business Email Compromise (BEC) In Full Force & Effect

Another university’s epic fail By DRP; Cybersecurity Lab Engineer There have been few attacks in the last five years that have been more successful overall and on average than the […]

Posted in Cyber Security News | Comments Off on Business Email Compromise (BEC) In Full Force & Effect

The Critical Differences between Security Orchestration and Intelligent Automation

By Kumar Saurabh, CEO, and Co-founder, LogicHub Ransomware, IoT attacks, phishing, cloud vulnerabilities—there are plenty of reasons for the increase in SecOps workloads. To reduce this growing burden on security […]

Posted in Cyber Security News | Comments Off on The Critical Differences between Security Orchestration and Intelligent Automation

3 Steps to Create a Culture of Cybersecurity

by Mary-Michael Horowitz It seems like every business is trying to improve its company culture. And that’s a good thing. An effective culture is built on solid values and a […]

Posted in Cyber Security News | Comments Off on 3 Steps to Create a Culture of Cybersecurity

Securing the Connected and Autonomous Vehicle

Difficult, yet fulfilling By DRP; Cybersecurity Lab Engineer Vehicles have been connected and on the road for years throughout the nation. This has been placed in the various vehicles and […]

Posted in Cyber Security News | Comments Off on Securing the Connected and Autonomous Vehicle

How to Defend Your Business against a Ransom Driven DDOS Attack

Responding to the surge in DDoS ransom campaigns By Stephanie Weagle, Vice President, Corero Network Security Since the inception of the internet, hackers have used DDoS attacks as a vehicle […]

Posted in Cyber Security News | Comments Off on How to Defend Your Business against a Ransom Driven DDOS Attack

Report Reveals that Companies’ Biggest Data Security Threat is … Their Own Employees? 

By Walter Fiorentini, Apricorn Cybercriminals are a scourge to every company: the security breaches they execute can inflict considerable damage to an organization’s reputation and bottom line, as well as […]

Posted in Cyber Security News | Comments Off on Report Reveals that Companies’ Biggest Data Security Threat is … Their Own Employees? 

Could Your Reactive Cyber Security Approach Put You Out Of Business?

By Ajay Unni, Founder and Chief Executive Officer of Stickman Cybersecurity is a concern for businesses of any of size, but it’s especially pressing for smaller companies. That’s because they […]

Posted in Cyber Security News | Comments Off on Could Your Reactive Cyber Security Approach Put You Out Of Business?

Surveying Anti-Phishing Standards – Part 2

By Marc Laliberte, Information Security Threat Analyst, WatchGuard Technologies In our last article, we looked at three different technology standards that combat spam and phishing attacks. If you haven’t read […]

Posted in Cyber Security News | Comments Off on Surveying Anti-Phishing Standards – Part 2

Ransomware: Nothing to Sneeze At

By Mike Andrews, Managing Director, NovaStor Corporation We’re heading into the cold season and the common cold is well… common. A trip to the pharmacy presents us with endless options […]

Posted in Cyber Security News | Comments Off on Ransomware: Nothing to Sneeze At

VPN: Do You Really Need It? This Will Help You Decide!

By Amelia Blanche Privacy is an aspect that is increasingly valued when it comes to surfing the Internet but is increasingly difficult to achieve. User data is too valuable for […]

Posted in Cyber Security News | Comments Off on VPN: Do You Really Need It? This Will Help You Decide!

Creep Hunters Canada Society

Collaborates with google developers to hunt online predators By Brendon S Brady, Executive Director, CHCSociety We are happy to announce that in the coming months we will be releasing an […]

Posted in Cyber Security News | Comments Off on Creep Hunters Canada Society

How to Make Notpetya Not Your Problem

4 critical steps organizations must take for ransomware defense by Noa Arias, Director of Marketing, Semperis The NotPetya attack took the world by storm when a compromised update of M.E.Doc […]

Posted in Cyber Security News | Comments Off on How to Make Notpetya Not Your Problem

Does Your Company Have Adequate Security Programs In The Era Of Cyber Attacks?

Many companies have a false sense of confidence about their cybersecurity capabilities By Doug Ramos, Security Practice Manager, Groupware Technology Facing ever-evolving malware, vulnerabilities and hacking attempts, companies today need […]

Posted in Cyber Security News | Comments Off on Does Your Company Have Adequate Security Programs In The Era Of Cyber Attacks?

Intel addresses high severity flaw in Processor Diagnostic Tool

Intel Patch Tuesday updates for July 2019 address a serious flaw in Processor Diagnostic Tool and minor issue in the Solid State Drives (SSD) for Data Centers (DC). Intel’s Patch […]

Posted in Cyber Security News | Tagged , | Comments Off on Intel addresses high severity flaw in Processor Diagnostic Tool

How to Become a Cyber Security Professional

If you want to switch to a career in cybersecurity, this is how you can get started By Ehtisham Hussain, Content Marketing Manager, QuickStart At the time this article is […]

Posted in Cyber Security News | Comments Off on How to Become a Cyber Security Professional

Lack of Infosec & Devsecops

Roots at  the college level By DRP; Cybersecurity Lab Engineer The InfoSec field and industry continue to grow at an outstanding pace. This is being driven by many market forces, […]

Posted in Cyber Security News | Comments Off on Lack of Infosec & Devsecops

Seeing Around Corners: Operatively-Sourced Intel Predicted a Ransomware Outbreak

Operatively-sourced intelligence signaled the rise of petya ransomware as early as January 2017… A game of cyber “cat and mouse” on a global level. By Byron Rashed, Vice President of […]

Posted in Cyber Security News | Comments Off on Seeing Around Corners: Operatively-Sourced Intel Predicted a Ransomware Outbreak

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X