Monthly Archives: August 2019

Virtual Private Server Market to Hit US$ 2 Billion by 2025

The IT & telecom sector is expected to hold a virtual private server market share of over 25% in 2025 due to the growing demand for secure virtualized infrastructure By […]

Posted in Cyber Security News | Comments Off on Virtual Private Server Market to Hit US$ 2 Billion by 2025

The Foundation Common to Most Security Frameworks: Addressing Configuration Controls

By Jeff Elliott We have entered the era of multiple security frameworks.  Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap […]

Posted in Cyber Security News | Comments Off on The Foundation Common to Most Security Frameworks: Addressing Configuration Controls

Machete cyber-espionage group targets Latin America military

Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as […]

Posted in Cyber Security News | Comments Off on Machete cyber-espionage group targets Latin America military

The Email Tracking and Fraud Prevention

By Milica D. Djekic Since the early beginnings of digital systems and the first discoveries of the email data exchange – there have been the heaps of methods how to […]

Posted in Cyber Security News | Comments Off on The Email Tracking and Fraud Prevention

Five Ways a Software Defined Perimeter Is Better Than VPN

By Etay Bogner, Founder & CEO, Meta Networks Can virtual private networks, created over 20 years ago, still provide an adequate solution for secure remote access these days? The well-defined […]

Posted in Cyber Security News | Comments Off on Five Ways a Software Defined Perimeter Is Better Than VPN

The Smart Encryption Procedures and Policies

By Milica D. Djekic The need to hide the message from your opponent would exist since the beginning of the ancient time. With the first countries and the rise of […]

Posted in Cyber Security News | Comments Off on The Smart Encryption Procedures and Policies

Cybersecurity & Your Company

Identifiable Threats and How to Block them By Frances Dewing, CEO, Rubica As smaller companies rely on technology to do their day-to-day business, their risk of being hacked increases. For […]

Posted in Cyber Security News | Comments Off on Cybersecurity & Your Company

The Iot Headache and How to Bolster Defenses

By Dr. Mike Lloyd, CTO, RedSeal There’s a saying in the security world: ’if it’s on the network, it belongs to the CISO’. And CISOs have risen to the occasion, […]

Posted in Cyber Security News | Comments Off on The Iot Headache and How to Bolster Defenses

How To Prevent Your Data Loss Using Enclosed Data?

By Milica D. Djekic Before we try to make some suggestions on how to prevent your data loss in the practice, we should attempt to explain what we mean by […]

Posted in Cyber Security News | Comments Off on How To Prevent Your Data Loss Using Enclosed Data?

July Patch Tuesday

Microsoft Resolved a Total of 77 Unique CVEs, Including Two Zero-Days that Have Been Reported in Attacks in the Wild By Chris Goettl, Director of Product Management, Security, Ivanti Microsoft […]

Posted in Cyber Security News | Comments Off on July Patch Tuesday

The Top 4 Application Security Defenses You Didn’t Know You Needed

By Jonathan DiVincenzo, Head of Product, Signal Sciences Application security isn’t a young buck anymore. The Open Web Application Security Project (OWASP) is 15 years old. But while application security […]

Posted in Cyber Security News | Comments Off on The Top 4 Application Security Defenses You Didn’t Know You Needed

What Is DNS Hijacking And How Can You Mitigate?

By Yair Green, CTO, GlobalDots DNS (Domain Name System) is crucial to all organizations that rely on the Internet for conducting business – it’s critical for the performance and reliability […]

Posted in Cyber Security News | Comments Off on What Is DNS Hijacking And How Can You Mitigate?

How Is Machine Learning Helping Cyber Defense?

By Richard Meadow The cyber defense needs to be constantly adapted in order to keep up with the developing threats thanks to more sophisticated technology. Thankfully, that’s where machine learning […]

Posted in Cyber Security News | Comments Off on How Is Machine Learning Helping Cyber Defense?

10 Steps to Kicking Off Your Insider Threat Program

By Mark Wojtasiak, vice president, Code42 Malware, ransomware and other external cyber threats are usually the security threats that grab the most headlines. You might be surprised to know that […]

Posted in Cyber Security News | Comments Off on 10 Steps to Kicking Off Your Insider Threat Program

How to Reduce Your Company’s Susceptibility to Hacking

Thinking before the attack, not about the aftermath By Zack Schuler, founder, and CEO of NINJIO When most people think about cybercrime, they think about headlines: data breaches that affect […]

Posted in Cyber Security News | Comments Off on How to Reduce Your Company’s Susceptibility to Hacking

One of the Greatest Threats Facing the Iot: Router Security

Why routers are among the most vulnerable devices in the IoT – and what we can do to protect them By Nitzan Daube, CTO, NanoLock Security The IoT is a […]

Posted in Cyber Security News | Comments Off on One of the Greatest Threats Facing the Iot: Router Security

GDPR

One Year On By Robin Bingeman, Managing Director, Cryoserver On May 25th, 2018, the EU rolled out a new set of data privacy laws under the General Data Protection Regulation […]

Posted in Cyber Security News | Comments Off on GDPR

Security by Design for Mobile Apps

With enterprise becoming increasingly reliant on mobile apps for many of its everyday business communications, processing sensitive data through these apps could pose a significant risk to data security. There […]

Posted in Cyber Security News | Comments Off on Security by Design for Mobile Apps

Bitglass 2019 Cloud Security Report: Only 20 Percent of Organizations Use Cloud Data Loss Prevention Despite Storing Sensitive Information in The Cloud

67 Percent of Organizations Believe Cloud Apps Areas Secure as or More Secure Than On-Premises Apps CAMPBELL, CA – July 17, 2019 – Bitglass, the Next-Gen CASB company, has just […]

Posted in Cyber Security News | Comments Off on Bitglass 2019 Cloud Security Report: Only 20 Percent of Organizations Use Cloud Data Loss Prevention Despite Storing Sensitive Information in The Cloud

Key Highlights from Next Week’s Black Hat USA 2019

KEY EVENT HIGHLIGHTS Background Information & Black Hat USA 2019 by the Numbers: What is Black Hat?Black Hat is a vendor‐neutral community that brings together leading professionals from the public and private sector, academia, and research to share the most […]

Posted in Cyber Security News | Comments Off on Key Highlights from Next Week’s Black Hat USA 2019

Vulnerability Management: Reducing the Remediation Gap

By Haythem Hammour, Product Marketing Manager, Brinqa It’s maddening. Security professionals are often fully aware of the vulnerabilities that lead to breaches in their systems. The challenge is remediation. It’s […]

Posted in Cyber Security News | Comments Off on Vulnerability Management: Reducing the Remediation Gap

Is Your Organization Ready For The Windows 10 Migration?

Synopsis: Organizations should look at the migration to Windows 10 as an opportunity to upgrade their Windows management. But they must also take measures to maintain security against evolving threats. […]

Posted in Cyber Security News | Comments Off on Is Your Organization Ready For The Windows 10 Migration?

CISA warns of critical flaws in Prima FlexAir access control system

The U.S. CISA published a security advisory to warn of multiple critical vulnerabilities affecting in Prima FlexAir access control system. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an […]

Posted in Cyber Security News | Comments Off on CISA warns of critical flaws in Prima FlexAir access control system

Your Enterprise Network: On-Premise, Cloud-Based, And the Transition In Between

By Jim Souders, Chief Executive Officer, Adaptiva Companies routinely struggle to quickly, easily and effectively push critical content and updates to every system within their enterprise. Endpoint security has always […]

Posted in Cyber Security News | Comments Off on Your Enterprise Network: On-Premise, Cloud-Based, And the Transition In Between

5 Simple Ways to Keep Your Personal Information Safe Online

Protecting your personal information can help reduce your risk of identity and data theft. Take these necessary safety precautions to avoid being a victim of hackers By Susan Alexandra, Contributing […]

Posted in Cyber Security News | Comments Off on 5 Simple Ways to Keep Your Personal Information Safe Online

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X