Yearly Archives: 2020
To Share, Or Not to Share
As consumers’ views on personal data evolve, it’s time to re-think data privacy By Kris Lovejoy, Global Consulting Cybersecurity Leader, EY Today organizations are standing at a crossroads when it […]
How We Securely Share Data in A Remote World
By Duncan Greatwood, CEO, Xage Security Cybersecurity solutions are often thought of as a single-issue solution: protecting companies from dangerous or costly hacks, or detecting hacks after they’ve already happened, […]
A Hybrid Workplace Means New Threats and More Pressure on IT Leaders
By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]
Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps
By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the […]
2021 Predictions on Defeating Cybercriminals
by Gary S. Miliefsky, Publisher, Author, Investor and Keynote Speaker Here we are and most of us are thankful that 2020 is almost behind us, since the global panic has […]
Making the Journey to the Intelligent SOC
AI, Machine Learning, and Open-XDR Make it Easier By Albert Zhichun Li, Chief Scientist, Stellar Cyber Most enterprises and service providers are building security operations centers (SOCs) where a team […]
What’s in Your Wallet? The Cybersecurity Costs of COVID
With new business challenges in play, organizations are shifting their cybersecurity spend accordingly By Mark Sangster, Vice President, and Industry Security Strategist, eSentire If anything has become clear over the […]
Amidst Election Noise, Cybercriminals See an Opportunity with Retail
By Chris Kennedy, CISO & VP of Customer Success, AttackIQ More than seven months into the onset of the novel coronavirus, it feels strange to look back on the things […]
The Coming Security Perspectives
By Milica D. Djekic It appears that today’s world landscape is under constant and chronical attack of security challenges. There is no time in history that was easy and it’s […]
All Aboard The COVID-19 Train: Malware Trends Taking Advantage of The Pandemic
By Bar Block, Threat Intelligence Researcher at Deep Instinct Since the outbreak of COVID-19, plenty of COVID-19 themed malware attacks have surfaced around the globe. Attackers take every chance they […]
Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications
By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]
The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year
By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to […]
PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs
Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner. Security researchers from Palo Alto Networks have discovered a new […]
Data Migration Security
What to Know By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
PyMICROPSIA Windows malware includes checks for Linux and macOS
Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms. Experts from Palo Alto Networks’s Unit 42 discovered a new […]
Why the Education Sector Must Address Security in The Rush to Digitise
By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]
US Agencies and FireEye were hacked with a supply chain attack on SolarWinds Software
Hackers broke into the networks of federal agencies and FireEye by compromising SolarWinds’ Orion Network Management Products. The cyber espionage group has tampered with updates released by IT company SolarWinds, […]
Anatomy of a hack – Solar Winds Orion
Nation State hacks major IS Software vender by James Gorman, CISO, Authx SolarWinds is one of the biggest names in IT support – and now one of the most notorious. […]
Revealed: How Banking and Finance GRC Leaders Struggle to Address Regulators’ Demands for Cyber Evidence with Confidence
By Charaka Goonatilake. CTO at Panaseer It’s one thing to keep data secure and assets protected, but another thing entirely to have the evidence at hand to prove your security […]
How Are Financial Services Firms Addressing the Requirements of Digital Transformation, Security, And Compliance?
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks The financial services sector is experiencing significant commercial disruption coupled with rapid innovation as established institutions strive to […]
Pay2Key hackers stole data from Intel’s Habana Labs
Pay2Key ransomware operators claim to have compromised the network of the Intel-owned chipmaker Habana Labs and have stolen data. Intel-owned AI chipmaker Habana Labs was hacked by Pay2key ransomware operators […]
Telegram for Business Communications: Understanding The Risks And Rewards
By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted […]
Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Learning Hardware Security Via Capture-The-Flag Competitions
By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]
Reflecting on 2020: Cybersecurity Black Unicorns of The Year
As we begin to wind-down 2020, we would like you to make sure you did not miss our annual Black Unicorn Report. You’ll see some of the most innovative and […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!) By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
Six Reasons to Review Your Identity and Access Management Strategy
Articles and blogs about Identity and Access Management (IAM) can be found on just about any technology-related website. Many articles point out the benefits of the myriad tools and products […]
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece, […]