Monthly Archives: August 2019
Virtual Private Server Market to Hit US$ 2 Billion by 2025
The IT & telecom sector is expected to hold a virtual private server market share of over 25% in 2025 due to the growing demand for secure virtualized infrastructure By […]
The Foundation Common to Most Security Frameworks: Addressing Configuration Controls
By Jeff Elliott We have entered the era of multiple security frameworks. Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap […]
Machete cyber-espionage group targets Latin America military
Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as […]
The Email Tracking and Fraud Prevention
By Milica D. Djekic Since the early beginnings of digital systems and the first discoveries of the email data exchange – there have been the heaps of methods how to […]
Five Ways a Software Defined Perimeter Is Better Than VPN
By Etay Bogner, Founder & CEO, Meta Networks Can virtual private networks, created over 20 years ago, still provide an adequate solution for secure remote access these days? The well-defined […]
The Smart Encryption Procedures and Policies
By Milica D. Djekic The need to hide the message from your opponent would exist since the beginning of the ancient time. With the first countries and the rise of […]
Cybersecurity & Your Company
Identifiable Threats and How to Block them By Frances Dewing, CEO, Rubica As smaller companies rely on technology to do their day-to-day business, their risk of being hacked increases. For […]
The Iot Headache and How to Bolster Defenses
By Dr. Mike Lloyd, CTO, RedSeal There’s a saying in the security world: ’if it’s on the network, it belongs to the CISO’. And CISOs have risen to the occasion, […]
How To Prevent Your Data Loss Using Enclosed Data?
By Milica D. Djekic Before we try to make some suggestions on how to prevent your data loss in the practice, we should attempt to explain what we mean by […]
July Patch Tuesday
Microsoft Resolved a Total of 77 Unique CVEs, Including Two Zero-Days that Have Been Reported in Attacks in the Wild By Chris Goettl, Director of Product Management, Security, Ivanti Microsoft […]
The Top 4 Application Security Defenses You Didn’t Know You Needed
By Jonathan DiVincenzo, Head of Product, Signal Sciences Application security isn’t a young buck anymore. The Open Web Application Security Project (OWASP) is 15 years old. But while application security […]
What Is DNS Hijacking And How Can You Mitigate?
By Yair Green, CTO, GlobalDots DNS (Domain Name System) is crucial to all organizations that rely on the Internet for conducting business – it’s critical for the performance and reliability […]
How Is Machine Learning Helping Cyber Defense?
By Richard Meadow The cyber defense needs to be constantly adapted in order to keep up with the developing threats thanks to more sophisticated technology. Thankfully, that’s where machine learning […]
10 Steps to Kicking Off Your Insider Threat Program
By Mark Wojtasiak, vice president, Code42 Malware, ransomware and other external cyber threats are usually the security threats that grab the most headlines. You might be surprised to know that […]
How to Reduce Your Company’s Susceptibility to Hacking
Thinking before the attack, not about the aftermath By Zack Schuler, founder, and CEO of NINJIO When most people think about cybercrime, they think about headlines: data breaches that affect […]
One of the Greatest Threats Facing the Iot: Router Security
Why routers are among the most vulnerable devices in the IoT – and what we can do to protect them By Nitzan Daube, CTO, NanoLock Security The IoT is a […]
GDPR
One Year On By Robin Bingeman, Managing Director, Cryoserver On May 25th, 2018, the EU rolled out a new set of data privacy laws under the General Data Protection Regulation […]
Security by Design for Mobile Apps
With enterprise becoming increasingly reliant on mobile apps for many of its everyday business communications, processing sensitive data through these apps could pose a significant risk to data security. There […]
Bitglass 2019 Cloud Security Report: Only 20 Percent of Organizations Use Cloud Data Loss Prevention Despite Storing Sensitive Information in The Cloud
67 Percent of Organizations Believe Cloud Apps Areas Secure as or More Secure Than On-Premises Apps CAMPBELL, CA – July 17, 2019 – Bitglass, the Next-Gen CASB company, has just […]
Key Highlights from Next Week’s Black Hat USA 2019
KEY EVENT HIGHLIGHTS Background Information & Black Hat USA 2019 by the Numbers: What is Black Hat?Black Hat is a vendor‐neutral community that brings together leading professionals from the public and private sector, academia, and research to share the most […]
Vulnerability Management: Reducing the Remediation Gap
By Haythem Hammour, Product Marketing Manager, Brinqa It’s maddening. Security professionals are often fully aware of the vulnerabilities that lead to breaches in their systems. The challenge is remediation. It’s […]
Is Your Organization Ready For The Windows 10 Migration?
Synopsis: Organizations should look at the migration to Windows 10 as an opportunity to upgrade their Windows management. But they must also take measures to maintain security against evolving threats. […]
CISA warns of critical flaws in Prima FlexAir access control system
The U.S. CISA published a security advisory to warn of multiple critical vulnerabilities affecting in Prima FlexAir access control system. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an […]
Your Enterprise Network: On-Premise, Cloud-Based, And the Transition In Between
By Jim Souders, Chief Executive Officer, Adaptiva Companies routinely struggle to quickly, easily and effectively push critical content and updates to every system within their enterprise. Endpoint security has always […]
5 Simple Ways to Keep Your Personal Information Safe Online
Protecting your personal information can help reduce your risk of identity and data theft. Take these necessary safety precautions to avoid being a victim of hackers By Susan Alexandra, Contributing […]