Monthly Archives: February 2020
The Growing Importance of API Security
APIs are everywhere, and they are ripe targets for malicious attacks By Ameya Talwalker, Co-founder and CPO, Cequence Security Earlier this year I wrote a blog about key trends in […]
Predictive Cyber Intelligence and Defenses using InfoSec Award Winning Cythereal
DTAG-CTI (Deutsche Telekom – Cyber Threat Intelligence) protects clients against cyber-attacks worldwide on a scale beyond most companies capabilities due to the nature of our business. Like us, the adversaries […]
The Secret to Winning IT Security Roulette
The Secret to Winning IT Security Roulette By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino […]
Industrial Control System Vulnerabilities: A Prime Target of Our Critical Infrastructure by Adversaries
By Dr. Daniel Osafo Harrison, DCS, C|CISO, CISM, CISA, CRISC, Security+ Industrial control system (ICS) is a dynamic technological system with subsystems such as programmable logic controllers (PLCs), Remote Terminal […]
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly […]
5 Recruitment Predictions in Cybersecurity For 2020
By Karl Sharman As we prepare for more figures to be produced saying the amount of jobs unfilled has increased by another 20%, I want to challenge every person in […]
Cybersecurity Talent Shortage and Ways to Address the Gap
By Blake Tinsley, Founder, and CEO, Prosyntix The cyber threat landscape is ever-evolving. From rapid deployment of new code for application usage, the Internet of Things (IoT) pushing for billions […]
FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019
FireEye’s report revealed that the incident response division Mandiant observed more than 500 new malware families in 2019. According to the FireEye Mandiant M-Trends 2020 report, FireEye analyzed 1.1 million […]
Secure Passwords are not Always Secure
Just because it meets the complexity test does not mean it is secure. By James Gorman, Lead Writer and Staff Reporter Cyber Defence Media Group Most of the insider threats and […]
Defending Forward
Human-Machine Teaming for Automated Predictive Prevention at Scale By James Wallace Hess, Director of Development, Cythereal Today’s threat landscape demands automated analysis and predictive prevention to efficiently harden protection structures […]
Privacy – A misunderstood issue
By Michael J. Nash Introduction Living in a modern, interconnected world brings enormous benefits. The most obvious is that the speed of communication and information sharing has opened up new […]
Cyber Defense Awards with Red Carpet – 8th Annual During RSA Conference 2020
Cyber Defense Magazine Announces Winners of the InfoSec Awards 2020 Winners of 8th Annual Coveted Information Security Awards announced today during RSA Conference 2020 SAN FRANCISCO (PRWEB) FEBRUARY 24, 2020 […]
Accelerating the Pace of Government IT Modernization
By Jeff Elliott For decades, the federal government has been hamstrung in its efforts to adopt new IT systems by the glacial pace of RMF accreditation and the manual processes […]
The Struggle of Updating Government Cybersecurity Measures
By Kayla Matthews The cybersecurity landscape is ever-changing, and staying on top of developments often requires promptness. Unfortunately, government bodies typically aren’t known for taking quick action. That’s because they […]
5 Key Steps to Secure IOT Product Development
By Kateryna Boiko, Marketing Manager, Mobilunity A new concept that has taken the world by storm is the so-called “Internet of Things” (IoT). IoT refers to systems designed to transfer […]
How to Address Multi-Cloud Security
By William Klusovsky, CISSP, CISM,NTT Ltd. Networks for our businesses are not as simple as they used to be. With the evolution of cloud environments and the multitude of “everything […]
Investing in Cybersecurity
By Sean Drake, Venture Investor Reporter for Cyber Defense Magazine As one of the top Venture Investor Reporters for CDM, I get to cover all the hot and interesting cybersecurity […]
Fox Kitten Campaign – Iranian hackers exploit 1-day VPN flaws in attacks
Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world Iran-linked attackers targeted Pulse Secure, Fortinet, Palo Alto Networks, and Citrix VPNs to hack into […]
Conquering the Cyber Security Challenges of The Cloud
By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing economies of scale and breakthrough technological advances to modern organizations, but it is more […]
Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack
Peripheral devices with unsigned firmware can expose Windows and Linux machines to hack, warn experts from firmware security firm Eclypsium. Experts at firmware security firm Eclypsium have discovered that many […]
US administration requests $9.8B for cyber 2021 budget for the Department of Defense
The US administration requested $9.8 billion for cyber in next year’s budget for the Department of Defense, the amount is the same as last year. The US administration requested $9.8 […]
Data Privacy in A Device-Driven World: Navigating the Impact Of California’s 2020 IOT Security Legislation
A call for consumer education on-device security vulnerabilities in light of the increasing push for IoT security regulation By Brian Murray Throughout the past few decades, the Internet of Things […]
US Govt agencies detail North Korea-linked HIDDEN COBRA malware
The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) released reports on North Korea-linked HIDDEN COBRA malware. The FBI, the US Cyber Command, and the Department […]
AttackiQ Report On Ponemon Survey:Despite Spending An Average Of $18.4 Million On Cybersecurity Solutions, Organizations Still Get Breached
Enterprises plan on increasing their security budgets in the next year too. However, the key to preventing breaches relies upon accurately identifying and remediating gaps in current security defenses. By […]
AttackIQ 2020 Predictions
By Christopher Kennedy, CISO and VP of Customer Success, AttackIQ 2020 Election Security Insecurity: Election security will be an open wound that can’t be healed in time for the 2020 […]
Bitglass 2020 Predictions
By Anurag Kahol, CTO and co-founder, Bitglass We will see an increase in the number of M&A deals in 2020. In fact, 79 percent of respondents to Deloitte’s M&A trends […]
Dell SupportAssist flaw exposes computers to hack, patch it asap!
Dell addresses a flaw in the Dell SupportAssist Client software that could allow local attackers to execute arbitrary code with Administrator privileges. Dell released a security update to address a vulnerability, tracked […]
ForgeRock 2020 Predictions
By Ben Goodman, SVP at ForgeRock and CISSP 2020 Will be the Beginning of the End of Passwords. Consumers already log in to dozens of protected resources everyday: from email, […]
DivvyCloud 2020 Predictions
By Chris DeRamus, CTO and co-founder, DivvyCloud Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, […]
Hacking the Vote: Article One of Many….any [Q+]uestions?
Diebold AccuVote-TSx Election Machine Hacking (first example, expect more, especially after tonight in New Hampshire…) My vote DID NOT count tonight. If you understand Optical Character Recognition (OCR) and about […]