Monthly Archives: September 2019
The challenges of an Internet of Things analytics
By Milica D. Djekic Through a history – we would notice the importance of good analytics in many areas of human activities. For instance, many military strategists would deal with […]
Addressing the government data security problem
By Marcelo Delima, Global Product Marketing Manager at HPE Security – Data Security Throughout federal, state, and local governments, the digital revolution is driving exponential growth of high-value data. Personally […]
Million of Telestar Digital GmbH IoT radio devices can be remotely hacked
A security researcher disclosed zero-day flaws in Telestar Digital GmbH IoT radio devices that could be exploited by remote attackers to hijack systems without any user interaction. The security researcher Benjamin […]
Momentum Cyber Releases 2019 Security Technology Spend Insight Report
Momentum Cyber and Optiv Security are pleased to release a new white paper entitled “2019 Security Technology Spend Insights Report,” which discusses the top five Cybersecurity technology buying trends, providing […]
10 cyber security measures growing companies should implement
Tips to keep your business safe as it expands By Asher de Metz, Lead Senior Consultant (Information Security), Sungard Availability Services (Sungard AS) This may surprise you, but growing companies […]
Venafi Survey: Many Organizations Overlook Threats Hiding in Encrypted Traffic
By Tim Bedard, director of threat intelligence and analytics for Venafi Encryption plays a critical role in the safety and security of our digital economy. Whether it’s protecting data from […]
Best Practices to keep your Home WiFi Secured
by Lisa Barrie, Sub-editor at List Enthusiast Wi-Fi internet or traditional wired internet? Ask any person and he/she’ll go for the former. The ease-of-use, easier installation, and maintenance mean Wi-Fi […]
Police dismantled Europe’s second-largest counterfeit currency network on the dark web
Police dismantled Europe’s second-largest counterfeit currency network on the dark web The European authorities announced to have dismantled Europe’s second-largest counterfeit currency network on the dark web. A joint operation […]
Infosecurity North America and Cyber Defense Magazine Partner – Honoring US Veterans…
Today, InfoSecurity North America and Cyber Defense Magazine are sharing very positive news as we collaborate to help shine a light on American Exceptionalism. US Veteran founded, funding, operated or […]
Multi-factor Authentication Implementation Options
“2FA to 5FA – What are the options available?” By David Smith Independent Consultant at Smart Card Institute At some point of time, we have all used an OTP (One-time […]
How Real-Time Asset Intelligence Enables Full Posture Control
By Ellen Sundra, VP of Americas Systems Engineering, Forescout Technologies The massive growth of devices hitting our networks is not a secret or a new discussion. We have all seen […]
The Dangers of the Integrated Home/Workplace
Personal data breaches are one of the fastest-growing cybercrimes in the US. As IoT devices become increasingly common at home and in the workplace, measures must be taken to secure […]
Armor’s Black Market Report Finds Hackers Selling Cash for Pennies on the Dollar, Credentials for RDP Servers (a Popular Entry Point for Ransomware), and Articles of Incorporation
Today, cloud security-as-a-service provider Armor, released its annual Black Market Report. The report finds that the underground hacker markets and forums, where financial data and personal information is bought and […]
Belarusian authorities seized XakFor, one of the largest Russian-speaking hacker sites
Ministry of Internal Affairs announced that Belarusian police have seized and shutdown XakFor, one of the largest hacking forums on the internet. Belarusian police have seized the servers of XakFor […]
Stop! Vulnerable Software
Know your vulnerabilities By Joe Guerra, M.Ed, CySA+, C|EH, Cybersecurity Instructor, Hallmark University Software is omnipresent, even in areas you wouldn’t envision Software so effortlessly meshes into the cloth of […]
Top Ten Requirements for Managed Security Services Providers
Top Ten Requirements for Managed Security Services Providers John Humphreys, Senior Vice President, Proficio According to research by the Ponemon Institute, cybercrime is increasing significantly and the cost of […]
Server less Security Analysis: The Best Practices on How to Enforce Them
By Aaron Chichioco, content editorial manager/web designer, Design Doxa Even before companies started making the jump to go serverless, security has already been a concern in a world largely becoming […]
Protecting Your Business against DDoS Attacks Requires Simple Best Practices
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the twenty years since a University of Minnesota computer came under attack from a network of over 100 […]
CVE-2019-15846 Exim mail server flaw allows Remote Code Execution
A security flaw in Exim mail servers could be exploited by local or remote attackers to execute arbitrary code with root privileges. The Exim development team has addressed a vulnerability […]
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to […]
Ready Position – Proactive Teams are Helping Solve the Cyber security Skills Shortage
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Some of the fans glancing toward the outfield at a baseball game may be recalling their own Little League days. […]
Cyber security Checklist: How to Keep Your Business Secure
By Lucy Manole, Content Writer, Right Mix Marketing Source: Freepik In this era of digitalization, businesses are moving online faster than ever, resulting in an explosion of data. Most companies […]
Public Sector Beware: 3 Steps to a Better Cyber attack Prevention Strategy
By Phil Richards, CISO, Ivanti Just as healthcare organizations were a popular target of ransomware attacks over the past two years, public sector organizations (including school districts, municipalities and local […]
How the Internet of Things Could Compromise Online Security
By Chris Usatenko, Content Creator, EveryCloud The concept of an Internet of Things has been a dream held by many tech geeks. Up until a few years ago, though, the […]
Data Risk Report Shows Lack of Security across Industries
87% of companies lack data security By Rob Sobers, software engineer, Varonis When it comes to cybersecurity, one of the top concerns is the risk and vulnerability of sensitive data. […]
Security-scorecard – Risk Assessment Made Simple!
An interview with Susanne Gurman of SecurityScorecard, from Black Hat 2019 Las Vegas, NV – Amidst all the hustle and bustle of Black Hat 2019, I was privileged to have […]
5 Key Differences between Software and Hardware Vulnerability Mitigations
By Anders Fogh, Senior Principal Engineer at Intel The software stack has long been a fruitful target for hackers looking to exploit organizations – and this is not likely to […]
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for […]
Ransomware: A Municipality’s Achilles Heel
By Russ Cohen, Vice President of Cyber Services, Chubb From large metropolitan cities like Atlanta to smaller communities like Key Biscayne, every city in America is vulnerable to cyber-attacks. In […]
New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom
Another US city was the victim of a ransomware attack, this time crooks hit the city of New Bedford, Massachusetts, asking for $5.3 Million Ransom, but… The systems of New […]