Monthly Archives: July 2019

You’ve Been Deceived about Deception Technology

By Carolyn Crandall, Chief Deception Officer, Attivo Networks It is easy to be misled about things that are unfamiliar. We see this happen regularly with fake news and manipulative communications […]

Posted in Cyber Security News | Comments Off on You’ve Been Deceived about Deception Technology

What Does Breach Prevention Mean?

By Milica D. Djekic When we talk about the cyber breaches, we would mean any attempt of the hacker’s community to approach our IT system and conduct some malicious activities […]

Posted in Cyber Security News | Comments Off on What Does Breach Prevention Mean?

Effective Security Training Is the Key to Fighting Cyber Attacks

How Hands-on Security Training for Development Teams Helps Minimize Hacks By Steindór S. Guðmundsson, CEO, Adversary The best strategy to counter cybercrime lies not in technological security solutions, but in […]

Posted in Cyber Security News | Comments Off on Effective Security Training Is the Key to Fighting Cyber Attacks

How to Manage Your Access Control?

By Milica D. Djekic Have you ever thought about how two computers talk to each other while they are in a network? So many network security experts would suggest that […]

Posted in Cyber Security News | Comments Off on How to Manage Your Access Control?

Ransomware Terrorism: Should We Be Worried?

By Marcus Chung, CEO of BoldCloud The threat of ransomware being used as a highly effective form of cyber terrorism has been receiving a lot of media attention lately. The […]

Posted in Cyber Security News | Comments Off on Ransomware Terrorism: Should We Be Worried?

New variant of Dridex banking Trojan implements polymorphism

Security researchers at eSentire tracked a new campaign spreading a variant of the Dridex banking Trojan that shows polymorphism. Security experts at eSentire observed a new campaign spreading a variant […]

Posted in Cyber Security News | Comments Off on New variant of Dridex banking Trojan implements polymorphism

June Patch Tuesday

Bluekeep still the most threatening vulnerability By Chris Goettl, Director of product management, security, ivanti June patch Tuesday has come. Microsoft is resolving 88 unique vulnerabilities this month including four […]

Posted in Cyber Security News | Comments Off on June Patch Tuesday

ViceLeaker Android spyware targets users in the Middle East

Experts at Kaspersky have uncovered a spyware campaign dubbed ViceLeaker that spreads in the Middle East to spy on Android users.  Kaspersky spotted a spyware campaign, tracked as ViceLeaker, that […]

Posted in Cyber Security News | Comments Off on ViceLeaker Android spyware targets users in the Middle East

Securing the Remote Patient Monitoring Ecosystem

By George W. Jackson, Jr. Senior Principal Consultant at Clearwater Compliance Every CISO knows that April 2019 was a grim milestone: the worst month for healthcare data breaches since 2010 […]

Posted in Cyber Security News | Comments Off on Securing the Remote Patient Monitoring Ecosystem

Broader, More Disruptive, More Critical: Cyber Threats Morphing as 5G, Machine Learning, and IoT Emerge

By Steve Durbin We’re already seeing commercials flaunting 5G coverage as the new wave of mainstream operational speed as we know it. This paired with organizations flaunting their machine learning […]

Posted in Cyber Security News | Comments Off on Broader, More Disruptive, More Critical: Cyber Threats Morphing as 5G, Machine Learning, and IoT Emerge

Criminals Obtain 2.8 Billion Consumer Records In 2018

By Robert Vamosi, CISSP and senior product marketing manager, ForgeRock Cybercriminals exposed 2.8 billion consumer data records in 2018, costing U.S. organizations over $654 billion according to a new report […]

Posted in Cyber Security News | Comments Off on Criminals Obtain 2.8 Billion Consumer Records In 2018

2019: Why Invest in Secure File Transfer This Year

Are You in the Business of Securing Your Data? Keeping your data secure may sound like an easy concept, but in reality, it’s no simple feat. Securing your sensitive data […]

Posted in Cyber Security News | Comments Off on 2019: Why Invest in Secure File Transfer This Year

Vulnerability in Medtronic insulin pumps allow hacking devices

Medtronic and the US government have warned that some Medtronic MiniMed insulin pumps are vulnerable to cyber attacks. Medtronic and the United States government have warned of a security vulnerability […]

Posted in Cyber Security News | Comments Off on Vulnerability in Medtronic insulin pumps allow hacking devices

Crooks stole millions from Bitrue Cryptocurrency Exchange

Another cryptocurrency exchange announced to have suffered a theft, this time is the victim is the Singapore-based Bitrue. It has happened again, crooks stole funds from another cryptocurrency exchange, this […]

Posted in Cyber Security News | Comments Off on Crooks stole millions from Bitrue Cryptocurrency Exchange

Ensuring the Security & Productivity of an Increasingly Remote Workforce

By Morey Haber, CTO & CISO, BeyondTrust Driven in large part by the globalization of technology, focus on a healthier work-life balance, and an uptick in the number of millennials […]

Posted in Cyber Security News | Comments Off on Ensuring the Security & Productivity of an Increasingly Remote Workforce

Know Who to Call When Phishing Strikes

By Russ Cohen As a former “white hat hacker” helping businesses improve cybersecurity by illuminating areas of vulnerability, one of the more creative aspects of my job was crafting a […]

Posted in Cyber Security News | Comments Off on Know Who to Call When Phishing Strikes

Enterprise Social Collaboration: Security Friend or Foe?

By Dr. Steve Marsh, Vice President of Product for Nucleus Cyber Enterprise collaboration is changing rapidly. Driven by the Cloud and how we share information in our personal lives, social […]

Posted in Cyber Security News | Comments Off on Enterprise Social Collaboration: Security Friend or Foe?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X