Monthly Archives: April 2020
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just […]
Shade Ransomware gang shut down operations and releases 750K decryption keys
The operators behind the Shade Ransomware (Troldesh) shut down their operations and released over 750,000 decryption keys. Good news for the victims of the infamous Shade Ransomware, the operators behind […]
Smart Buildings
Understanding the Security Risk By Andrea Carcano, Nozomi Networks Co-founder and CPO Smart Buildings: Understanding the Security Risks Today many of the world’s most forward-thinking workplaces are deploying smart technologies […]
The Hard Drive Secondary Market: The Sorry State of The Industry
Why NextUse Hard Drive Quality Surpasses the Competition By James Mannering, Hard Drive Product Manager at NextUse Remarketing, the reselling of end-of-life or retired IT assets like hard drives, is […]
Zscaler saw 30,000% increase in Coronavirus-themed attacks
Researchers at Zscaler observed an increase of 30,000% in Coronavirus-themed attacks in March when compared to the beginning of 2020. Researchers from Zscaler observed an increase of 30,000% in Coronavirus-themed […]
Shadow Iot Devices A Major Concern for Corporate Networks
By Ashraf Sheet, Regional Director Middle East & Africa at Infoblox Infoblox Inc., the leader in Secure Cloud-Managed Network Services, today announced new research that exposes the significant threat posed […]
Network Security Must Keep Up with Video Surveillance Systems’ Rise in Criticality to Public Safety and Security in The Middle East
By Rabih Itani, the Middle East region security business head at Aruba, a Hewlett Packard Enterprise company The Video Surveillance market in the Middle East region continues to grow in […]
Vietnam-linked APT32 group launches COVID-19-themed attacks against China
The Vietnam-linked cyberespionage group tracked as APT32 carried out hacking campaigns against Chinese entities to collect intelligence on the COVID-19 crisis. Vietnam-linked APT group APT32, also known as OceanLotus and […]
The Gap in Security – Data Centric Security
By Eric Rickard, CEO, Sertainty Federal Systems What do the Coronavirus pandemic, 9/11 terrorist attacks, Boeing 737 MAX crashes, and the OPM data breach have in common? First, their root […]
COVID-19 – Neo-Nazis spread a list of credentials for Gates Foundation, NIH, and WHO employees
Nearly 25,000 email credentials allegedly from NIH, WHO, Gates Foundation and other organizations involved in the containment of COVID-19 pandemic are dumped online While the principal organizations engaged in the […]
VPNs – 2020 And Beyond
By Sebastian Schaub, Founder and CEO, hide.me In the last 5 years, awareness to protect data, to encrypt communication, and minimize data collection has rapidly increased. Privacy and trust will […]
Spearphishing attacks hit the oil and gas industry sector
Hackers launched spear-phishing attacks against organizations in the oil and gas industry sector spreading the Agent Tesla info-stealer malware. Crooks are targeting organizations in the oil and gas industry sector […]
Malware – A Cyber Threat for 2020
By Pedro Tavares, Founder of CSIRT.UBI & Editor-in-Chief seguranca-informatica.pt We are facing a transition to a new decade. The maturity in the field of cybersecurity is growing, but a wave […]
Tor Project cut a third of its staff due to the Coronavirus
The Tor Project cut a third of its staff due to the economic impact of the ongoing Coronavirus outbreak, 13 staffers out of 35 left the team. The ongoing Coronavirus […]
Mastering Communication in Cyber Intelligence Activities: A Concise User Guide
Communication is key in intelligence activities. On the one hand, it is essential to transfer to a number of recipients the knowledge coming from information acquisition and analysis (“intelligence communication”); […]
Predicting the Direction of The PAM Market In 2020
A Look at What is Next on the Horizon for Securing Organizations’ Privileged Accounts By James Legg, President, and CEO, Thycotic As each year passes, we analyze the successes and […]
Cyber Defense and Cultural Heritage
By Milica D. Djekic Let’s look back several centuries in the past and try to imagine what technologies the people of that time might have used in their lives. If […]
Analysing Data Using the Intelligence Cycle: An Overview
By Alan Blaney, Managing Director of Focus Training When it comes to analyzing different forms of intelligence, using a detailed and coherent process is crucial in order to determine the […]
Drowning in A Sea of Threat Data? Consider A Curator
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the wake of increasing cybersecurity threats and data breaches, a whole host of network monitoring and threat intelligence […]
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources […]
Launching Cyber Defense Webinars with Prizes worth Thousands of Dollars Each Month!
You asked and we listened. We’re launching webinars each month, only with the industry’s best and brightest. At the end of each webinar, randomly selected attendees will receive prizes such […]
Microsoft addresses three Windows issues actively exploited
Microsoft Patch Tuesday security updates for April 2020 address 113 flaws, including three Windows issues that have been exploited in attacks in the wild. Microsoft Patch Tuesday security updates for […]
Juggling Your Clouds
Managing the Federal Government’s Multi-Cloud Future By Cameron Chehreh, Chief Technology Officer, Dell Technologies Federal Driven by the recent Cloud Smart initiative, federal agencies are prioritizing cloud and on track […]
Crooks target Healthcare facilities involved in Coronavirus containment with Ransomware
PaloAlto Networks experts warn of malicious Coronavirus themed phishing campaigns targeting government and medical organizations. Experts from Paloalto Unit 42 published a report that analyzes the cross-section between the various […]
Devops – Are You Risking Security for Agility?
By Morey Haber, CTO & CISO, BeyondTrust By merging software development and IT operations ― two traditionally mutually exclusive functions ― DevOps has fundamentally transformed how today’s organizations develop, operate […]
SFO discloses data breach following the hack of 2 of its websites
San Francisco International Airport (SFO) disclosed a data breach, its websites SFOConnect.com and SFOConstruction.com were hacked last month. In March hackers compromised two websites of San Francisco International Airport (SFO) […]
Mastering Automation to Solve Data Security for Healthcare Practices
If the Biggest Organizations Can’t Keep Our Data Safe, Then How Can a Small One? By Anne Genge, CEO, Alexio Corporation One of the greatest challenges of 21st-century is cyber-security. […]
Why Zero Trust Isn’t So Trustworthy
By Benny Lakunishok, CEO and co-founder of Zero Networks Everyone agrees a zero-trust network model is an optimal way to protect your network. But can you really reach that goal […]
German foreign ministry limits the use of Zoom over security concerns
The German foreign ministry has restricted the use of the video conferencing service Zoom due to concerns about security vulnerabilities recently discovered. During Coronavirus pandemic video conferencing services have become […]
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information […]