Monthly Archives: March 2020
Moving Network Security to The Cloud
What is secure access service edge (sase) and why it matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only […]
Expert publicly discloses Zoho ManageEngine zero-day on Twitter
A security researcher has disclosed details and PoC code for a zero-day vulnerability in the Zoho ManageEngine product via Twitter. A security expert has disclosed details about a zero-day vulnerability […]
General Motors & the AUTO-ISAC are “Defending YOUR Wheels™”*
San Francisco – The title of the keynote presentation at RSA by Mary Barra, Chairman and Chief Executive Officer of General Motors, aptly describes the reality for anyone who is […]
Coronavirus as an Opportunity to Evolve Security Architecture
By Zohar Rozenberg, VP of Cyber Investments for Elron [Editor’s Note: This article is included in a series of current commentaries on the broad-ranging technical and economic effects of the […]
US officials charge two Chinese men for laundering cryptocurrency for North Korea
The Department of Justice has charged the two Chinese nationals for laundering cryptocurrency for North Korea-linked APT groups. The US Treasury Department and the Department of Justice have imposed sanctions […]
Comprehensive Cyber Security For Digital Era!
Demystifying the requirements and identifying the right solution with necessary ingredients By:Lalit Shinde, Head of Partnerships and Business Dev., Seceon Inc. In today’s digital era, almost all organizations whether large, […]
Beyond UEBA and DLP: New Visibility for Insider Threats
Beyond UEBA and DLP: New Visibility for Insider Threats By Mary Roark, Director of Product Marketing, Cyberhaven Many security teams lack the visibility tools to show the business where the […]
World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale. […]
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read, […]
COVID-19: Disaster Preparedness for the Digital-First Business
By Otavio Freire, President, CTO and Co-Founder SafeGuard Cyber COVID-19, also known as coronavirus, is proving to be a stubborn pathogen. Tragically, the global death toll has now surpassed 3,000. […]
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls […]
Understanding the True Value of Digital Health Data
By Anne Genge, CEO, and co-founder of Alexio Corporation The story of Bob ‘What do I care if someone reads my dental chart?” This is what Bob said before I […]
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management […]
A Terrifying Diagnosis: Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
By Pieter Danhieux, Co-Founder and Chairman/CEO of Secure Code Warrior Cyberattacks have become a way of life these days. People almost expect to hear news about some new vulnerability or […]
SurfingAttack – hacking phones via ultrasonic waves
SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in ultrasonic waves. SurfingAttack is a hacking technique that sees voice […]
Beyond UEBA and DLP: New Visibility for Insider Threats
Beyond UEBA and DLP: New Visibility for Insider Threats By Mary Roark, Director of Product Marketing, Cyberhaven Many security teams lack the visibility tools to show the business where the […]
How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that. […]
All versions of Apache Tomcat are affected by the Ghostcat flaw
Ghostcat flaw affects all versions of Apache Tomcat and could be exploited by hackers to read configuration files or install backdoors on vulnerable servers. All versions of Apache Tomcat are […]
The Consumer Technology Association – What Trends Lie Ahead in the 2020’s
If one thing was made boldly apparent at the CES 2020, it’s that everything is trending toward connectivity. Soon, there will be scarcely any facet of our daily lives that […]
Why Zero Trust Isn’t So Trustworthy
Why Zero Trust Isn’t So Trustworthy By Benny Lakunishok, CEO and co-founder of Zero Networks Everyone agrees a zero trust networkmodel is the optimal way to protect your network. […]
Facial recognition firm Clearview AI reveals intruders stole its client list
Bad news for the controversial facial recognition startup Clearview AI, hackers gained “unauthorized access” to a list of all of its customers. The controversial facial-recognition company that contracts with law-enforcement agencies announced […]
Not All Hackers Are Criminals, And Some of The Good Guys Can Earn A Million Dollars
Dr. Roberto Di Pietro, a full professor of cybersecurity at Hamad Bin Khalifa University’s College of Science and Engineering, explains why there is a misconception about the term ‘hackers’. The […]
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal […]