Monthly Archives: November 2019
In A World of External Threats, How Are Businesses Putting Themselves In Jeopardy?
By Stephanie Douglas, Senior Managing Director, Guidepost Solutions Just about every possible facet of your personal information can be subject to compromise: credit card or social security numbers, social media […]
How to Keep Your Customer’s Credit Card Information Safe
Strong cybersecurity goes without question By John Shin, Managing Direction, RSI Security Protecting customer data is closely related to delivering satisfying customer experience. An enjoyable meal in a beautiful restaurant […]
So, Ya Wanna Be A Pen Tester, Huh?
Here are some things to consider By D. Greg Scott, Author of Bullseye Breach and Virus Bomb Do you like tearing software apart and putting it back together again, stronger […]
Simple Ways SMBs Can Protect Themselves against Cyber-Threats
By John Ford, Chief Information Security Officer, ConnectWise It seems as if every couple of weeks or so, a major news story flashes across our screens detailing a massive data […]
Mysterious DarkUniverse APT remained undetected for 8 years
Kaspersky discovered a previously unknown APT group, tracked as DarkUniverse, by analyzing Shadow Brokers’ “Lost in Translation” data dump. In 2017, a hacker group known as the Shadow Brokers stolen […]
‘Light commands’ attack: #hacking #Alexa, #Siri, and other #voiceassistants via Laser Beam
Researchers with the University of Michigan and the University of Electro-Communications (Tokyo) have devised a new technique, dubbed “light commands,” to remotely hack Alexa and Siri smart speakers using a […]
How to Suggest Your Manager to Invest into Cyber Defense?
By Milica D. Djekic The first personal computers would appear in the early 80s of the 20th century. Since then the entire technological posture has changed and evolved so rapidly, […]
How to Address the Top 5 Human Threats to Your Data
By Dave Sikora The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to protect. For most businesses today, that most valuable asset […]
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts, […]
The Social Engineering Methods and Countermeasures
By Milica D. Djekic During the time, the people would always try to get what some individuals being the part of some group would assume as so confidential to them. […]
Intelligent Automation Week
Inspired. Engaged. Connect. Intelligent Automation Week focuses on YOUR journey across the realms of RPA and AI to allow you to overcome YOUR challenges with an eye for the future! […]
Talk About a Disaster
Fema Exposes Disaster Survivor’s Personal Data By Charles Parker, II; MBA/MSA/JD/LLM/PhD FEMA’s mission involves assisting citizens as they face natural disasters (hurricanes, wildfires, etc.). Over the years, FEMA has had […]
Modernize the Mission: Implementing TIC 3.0 and Zero Trust Networking
By Stephen Kovac, Vice President, Global Government Head of Corporate Compliance, Zscaler, Inc. Today’s workplace functions on the expectation of mobility – work from any device at any location. While […]
Avoiding Misinformation for Content Moderators
By Sarah Katz, Cyber Security Specialist Provided the controversy surrounding foreign fake news that allegedly influenced the 2016 presidential elections in countries such as France and the United States, concern […]
CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks
One of the two flaws in Chrome addressed by Google, CVE-2019-13720, was exploited in a campaign that experts attribute to Korea-linked threat actors. This week Google released security updates to […]
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that […]
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from […]
Where Property Insurance Ends and Cyber Insurance Begins—the Industry’s Biggest Issue More People Should Be Talking About
By Matt Prevost, Senior Vice President, Cyber Product Manager at Chubb Cyber-attacks are expected to cost companies more than $2 trillion in 2019, according to Juniper Research. Consequently, many companies—especially […]
From Guards to Detectives: Evolving the Junior Security Analyst Role
By Mike Armistead, CEO and Co-Founder, Respond Software Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human roles with the support of intelligent […]
The Intersection of Artificial Intelligence and Cybersecurity
By John Harrison, Director, Cybersecurity Center of Excellence, Criterion Systems It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years, and while it […]
3 Must-Do Tasks to Make Vulnerability Management Useful in Today’s Environments
By Jim Souders, Chief Executive Officer, Adaptiva I recently heard an executive describe how his team essentially threw its vulnerability report in the trash every time they received one. This […]
Why Do You Need a DMZ Gateway?
In today’s business world, exchanging files with trading partners and customers is essential. There’s no doubt that data security and keeping private information secure is a pressing issue. Your organization […]
Detrimental Ransomware Effects
Lost coursework and headaches By Charles Parker, II Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828 students, aged between 11 […]
Achieving Cybersecurity Readiness with AI-Powered, Gamified Training
By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence “THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems […]