Monthly Archives: June 2020
Cyber Operations Could Cause Traumatic Experiences
By Milica D. Djekic It’s quite risky spending your time in cyberspace. This environment could deal with so many traps, holes, and weird openings. In other words, it’s possible only […]
Akamai mitigated the largest ever PPS DDoS attack
Akamai announced to have mitigated a record distributed denial-of-service (DDoS) attack that hit a European bank. Akamai revealed that a bank in Europe was hit by a massive distributed denial-of-service […]
Security in A Multi-Cloud Environment
By Paul Nicholson, Sr. Director of Product Marketing, A10 Networks As companies leverage a multi-cloud strategy to improve IT operations and provide better services to their customers, they can’t afford […]
The Ransomware Age and How to Fight It
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption […]
Mitigating Against Ransomware: Don’t Let Backups Be the Back Door
By Rick Vanover, Senior Director, Product Strategy, Veeam The damage ransomware can inflict on businesses is staggering. For businesses who feel they have no choice but to pay cybercriminals in […]
Returning to the Office After COVID-19: A Checklist for Business
As countries, states, and cities begin to ease lock-down restrictions, this checklist for reopening the office can help you jump start your return. You and your team have been quarantined […]
A daily average of 80,000 printers exposed online via IPP
Experts found tens of thousands of printers that are exposed online that are leaking device names, organization names, WiFi SSIDs, and other info. It’s not a mystery, a printer left […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and Route These “Below the Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
How to Secure IT And OT In Industrial and Manufacturing Environments
By Christopher Dobrec, Vice President of Product Marketing at Armis Operational Technology (OT) systems, which include critical infrastructure, are increasingly becoming more exposed to cyber-attacks. The control and telemetry systems […]
Moroccan journalist targeted with network injection attacks using NSO Group ‘s spyware
Researchers at Amnesty International collected evidence that a Moroccan journalist was targeted with network injection attacks using NSO Group ‘s spyware. In October 2019, security experts at Amnesty International’s Security […]
Fighting Back Against Powerful New DDoS Attack Vectors
By Tom Bienkowski, Director of Product Marketing, NETSCOUT Conniving hackers are launching sophisticated Distributed Denial of Service (DDoS) attacks more quickly, which presents many risks for enterprises. Research shows there […]
Introducing the Role of The Chief Cybercrime Officer
Can the CISO and CCO work in harmony? By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks The TalkTalk data breach in 2015 had big repercussions. With the […]
Still Using Spreadsheets to Manage Your Digital Certificate Security?
Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital […]
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]
Women’s Health and Safety Amidst COVID-19 Cybercrime
By Sarah Katz, Senior Cyber Security Analyst, NASA Ames Research Center As the past two months have seen the COVID-19 pandemic sweep the globe, domestic violence has spiked across multiple […]
Black Kingdom ransomware operators exploit Pulse VPN flaws
Black Kingdom ransomware operators are targeting organizations using unpatched Pulse Secure VPN software to deploy their malware. Researchers from security firm REDTEAM reported that operators behind the Black Kingdom ransomware […]
Digital Healthcare: How Secure Is the Care Data?
By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing, […]
In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats
Exabeam’s ‘2020 State of the SOC Report’ offers peer-to-peer SOC comparisons by Steve Moore, chief security strategist, and Samantha Humphries, senior product marketing manager, Exabeam Security operations centers (SOCs) are […]
The Devil Inside
Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]
New Expectations for the Network Perimeter
Patchwork network of legacy solutions won’t keep bad actors out By Barrett Lyon, Co-founder, and CEO, Netography U.S. government agencies are placing increased importance on cross-network visibility for cloud and […]
Tech firms suspend use of ‘biased’ facial recognition technology
Amazon, IBM and now Microsoft ban the sale of facial recognition technology to police departments and are urging for federal laws to regulate its use. Microsoft has joined Amazon and […]
Newsjacking COVID-19 and Other Common Cybersecurity PR Mistakes
By Evan Goldberg, SVP and Cybersecurity Practice Group Director, ARPR If you were to reflect back to the beginning of the previous decade, you’d be hard-pressed to remember more than […]
Building a “Culture of Caring” for Clients
By Jessica Smith, Senior Vice President, Crypsis Group When you work in the services industry, it’s natural to become frustrated when clients don’t do the fundamentals that could prevent significant […]
Ditch Legacy Approaches – Reimagine Cloud Security Based on Virtualization
By Avi Shua, CEO, and co-founder, Orca Security; former chief technologist at Check Point Software Technologies Abstract: Humans are used to thinking in metaphors. While convenient, this limits our ability […]
Dark Basin, a hack-for-hire group that remained under the radar for 7 years
A hack-for-hire group tracked as Dark Basin targeted thousands of journalists, advocacy groups, and politicians worldwide over 7 years. Researchers from Citizen Lab uncovered the operations of a hack-for-hire group […]
Two Critical Remote Code Execution flaws fixed in IBM WebSphere
IBM has addressed two critical vulnerabilities in IBM WebSphere Application Server that could allow a remote attacker to execute arbitrary code. In April, a security researcher who goes online with […]
Cleaning up “Dirty” Wi-Fi for Secure Work-from-Home Access
By Matias Katz, CEO, Byos A great deal of emphasis has been placed on the use of VPNs to help provide safe, secure connectivity during this historic COVID-19 crisis and […]
Cyber-Secure Access Control Solutions for Workplaces
By Imran Anwar FBI has reported a 400% increase in cybercrime reports during the COVID-19 pandemic. Cybersecurity has become a big challenge for business owners while they try to keep […]