Monthly Archives: September 2020
Cyber Liability Insurance – Safe Bet or Sales Gimmick?
By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we see more stories about companies overtaken by this type of cyberattack. Garmin and Canon, […]
Mapping Automation to the MITRE ATT&CK Framework
By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative, both […]
Automotive Cybersecurity Is Not One-Size-Fits-All. Here’s How Oems And Tier 1s Can Tailor Their Approach to Meet the Needs of The Market
OEMs, Tier 1s, and key supply chain players all differ in their approach to cybersecurity, opting for strategies that align specifically with their needs. Chief Product and Marketing Officer Nathaniel […]
Privacy Shield Revoked
What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies On July 16th, the European Court of Justice (ECJ) struck down the EU-US data […]
Manual vs. Automatic Cybersecurity Testing: What’s the Difference?
By Tamir Shriki, Customer Operations Manager, XM Cyber In the context of cybersecurity, if you want to protect something, you need the ability to test its defenses. It’s the only […]
German investigators blame Russian DoppelPaymer gang for deadly hospital attack
The investigation of German authorities on the recent attack on the Dusseldorf hospital reveals the possible involvement of Russian hackers. Last week, German authorities revealed that a cyber attack hit […]
5 Ways to Avoid Security Automation Pitfalls
By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to boost threat detection and response. […]
Mozi Botnet is responsible for most of the IoT Traffic
The Mozi botnet accounted for 90% of the IoT network traffic observed between October 2019 and June 2020, IBM reported. Mozi is an IoT botnet that borrows the code from […]
Weaknesses of Biometric Authentication
By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever. The democratization of digital […]
Media Content Captured on Mobile Is Driving Compliance Problems
Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, Inkscreen Recent headlines are once again demonstrating the consequences of employees’ […]
Funding Schemes and Cyber Security
By Milica D. Djekic What a lovely day; you are just searching your web for some online business opportunities or you are reviewing the cyberspace to get the stipend for […]
How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters
By Don Boxley, co-founder, and CEO, DH2i [https://dh2i.com] Cybersecurity researchers at the independent security research group JSOF recently discovered at least 19 security vulnerabilities that are found at the base […]
Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy
By Joanne Godfrey, Security Evangelist, ZeroNorth Companies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But […]
Do Not Forget to Securely Lock Your Data in Microsoft Teams
By Johanna Reisacher, Marketing Manager, Secomba GmbH More and more employees work from home. As a result, in the last months the demand for Microsoft products, especially Microsoft Teams, has […]
Zerologon attack lets hackers to completely compromise a Windows domain
Zerologon attack allows threat actors to take over enterprise networks by exploiting the CVE-2020-1472 patched in the August 2020 Patch Tuesday. Administrators of enterprise Windows Servers have to install the August […]
The “New Normal” – Navigating Remote Work and Security in the COVID-19 Era
By Bill Delisi, CEO of GOFBA There are many “new normal” that apply to different parts of life and certain industries. For cybersecurity, a core change to the landscape is […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Compliance in A Connected World
By Kirsty Fisher, CFO, Titania In 2019, Microsoft made waves at its annual Black Hat conference in Las Vegas, where it confirmed its discovery of a malicious hacker group that […]
Securing the Weakest Links in Today’s Public Cloud Environments
By Avi Shua, CEO, Orca Security The demand for cloud security is continuing to explode, with short-term needs being accelerated by the shift to remote work during the pandemic. According […]
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes […]
Cybersecurity Vendor Landscape – Exclusively from Momentum Cyber
We are pleased to provide you with Momentum’s Cybersecurity Market Review for 1H 2020. Strategic activity in the first half of 2020 included 293 transactions completed totaling $14.5B in deal value across M&A (93 transactions, $9.8B) […]
Protecting a Mobile Workforce with Hybrid DNS Security
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox The future of the workplace is undoubtedly a remote workforce, accessing the corporate network via mobile devices and the […]
New Research Highlights Importance of HTTPS Inspection to Detect Encrypted Malware
Two-thirds of malware in Q1 2020 was delivered via HTTPS traffic, Monero cryptominers are on the rise and more By Marc Laliberte, Senior Security Analyst at WatchGuard Technologies Today’s threat […]
Eyes Wide Shut: Cybersecurity Smoke & Mirrors and The Dawn of Cyber Transparency
CYBER DEFENSE WEBINARS Upcoming Webinar: Tuesday, September 15, 2020 from 2:00-3:00 PM EDT DESCRIPTION This presentation will walk attendees down the path of ‘where did we come from, how did […]
Cyber Literacy in Post-Digital Era as Part of National Security
By Aliaksei Hapeyeu, master’s degree student from Shandong University Cyberspace in the post-digital era has become not only a tool, but also a domain where people live, work, and relax. […]
Cyber Warfare and Its Impact on Businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
Shields Up with MITRE – Free Active Defense Knowledgebase
What’s Shield? Shield is an active defense knowledge base MITRE is developing to capture and organize what we are learning about active defense and adversary engagement. Derived from over 10 […]
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on […]
What Is Being Done, And How Can They Improve?
By Martin Banks People have worried about the safety of nuclear energy since it first came around in the mid-twentieth century. Nuclear energy has a lot of potential for powering […]
Industrial Control System – Security Focus of Federal Effort
By Trip Hillman, Director of Cybersecurity Services at Weaver More and more, industrial control systems have been the targets of malware, ransomware, and other kinds of cyberattacks. These attacks jeopardize […]