Monthly Archives: November 2020
Unlocking the Promise of Packet Capture
By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]
The Serverless Security Machine
By Art Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]
The One-Stop Spear Phishing Defense Guide You Will Ever Need
By Jeff Penner, Senior Manager at ActiveCo Technology Management. Is your business ready to combat spear phishing attacks? It’s a question that gives many seasoned CTOs bad jitters. The truth […]
Cybersecurity Best Practices for End Users
By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]
How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night
Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]
Halting Hackers on the Holidays
Expert tips for keeping your information safe while you shop online Commentary As we approach major holidays, with Black Friday and Cyber Monday right around the corner and a massive increase in […]
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations […]
Mitigating the Pitfalls of Onedrive Security
By Veniamin Simonov, Director of Product Management, at NAKIVO Inc. With COVID-19 triggering a potential long-term shift to working from home, SecOps teams are coming under increasing pressure to keep […]
Automated Pentesting – Ready to Replace Humans?
Is Automation the end of human pentesting? By Alex Haynes, CISO, CDL In the past few years, automation in many spheres of Cybersecurity has increased dramatically, but pentesting has remained […]
Zero Trust Model Is Meaningless Without TLS Inspection
Protecting users against modern, invisible cyber threats By Babur Khan, Technical Marketing Engineer at A10 Networks A security strategy is only as strong as its weakest point. No matter how […]
Emotet Attacks Surge in 2020, but Could Be Prevented
By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]
New Grelos skimmer variant reveals murkiness in tracking Magecart operations
Security experts from RiskIQ discovered a new variant of the Grelos skimmer that presents overlap with Magecart group operations. Researchers from RiskIQ analyzed the increased overlap of a new variant of the […]
Behind the Scenes of AppSec’s Misalignment
There’s something to be heard in the conversation. By John Worrall, CEO at ZeroNorth We live in a world defined by software, which is precisely why it must be secure. […]
Takeaway from the SANS Institute Attack: Without Proper Care, “Consent Phishing” Can Happen to Anyone
Gamified Training for Security Teams Can Raise Vigilance and Advance Skills to Defend Against the Latest Attack Exploits. By Chloé Messdaghi, VP of Strategy, Point3 Security The SANS Institute, established […]
No Meows Is Good News: Proactive Nosql Database Security in The Era of Meow Attacks
By Jack Harper, Director of Professional Services at Couchbase This summer, a spate of cyberattacks in which cybercriminals targeted internet-connected ElasticSearch and other unsecured databases continued to fuel concerns about […]
Has Your Data Been Leaked to the Dark Web?
By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]
Three Educational Cyber Security Steps for The Protection of Your Personal Data
1. Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen and abused. […]
Data Migration Security
WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
Perfecting Your Cybersecurity Sales Process
By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]
The Impact of Ransomware on Cloud Services and How to Stop Attacks
By Davit Asatryan, Product Manager, Spin Technology Cloud technology and services continue to gain popularity due to their ability to allow businesses to cut costs, improve an outdated IT infrastructure, […]
Microsoft Patch Tuesday fixes CVE-2020-17087 currently under active exploitation
Microsoft Patch Tuesday updates for November 2020 address 112 flaws, including a Windows bug that was chained with Chrome issues in attacks. Microsoft Patch Tuesday updates for November 2020 address […]
How COVID Tests the Resilience of Your Cloud Data Infrastructure
By Noah Johnson, Co-founder & CTO, Dasera In recent years, we’ve seen a massive shift as companies eliminate the physical restraints of IT infrastructure and its users by moving to […]
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people […]
Why Cybersecurity Awareness is More Important During COVID-19
Do you know the need for cybersecurity training for your organization? If not, learn more about the importance! By Susan Alexandra, Contributing Writer Cyber-attacks, malicious activity, and phishing scams have […]
FBI warns of attacks on unsecured SonarQube used by US govt agencies and businesses
The FBI warns that threat actors are abusing misconfigured SonarQube applications to steal source code from US government agencies and businesses. The Federal Bureau of Investigation has issued an alert […]
Is User Experience Standing in the Way of Success in CyberSecurity Companies?
Cyber security product development and user experience are sometimes at odds, but they shouldn’t be. In developing a security product, the focus is often concentrated on perfecting the code on […]
3 Educational Cyber Security Steps for The Protection of Your Personal Data
By Ankit Rajpurohit Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen […]
RansomExx ransomware now targets also Linux systems
The RansomExx Ransomware gang is expanding its operations by creating a new version that is able to infect Linux machines. RansomExx ransomware operators are expanding their operations by developing a Linux […]
Apple addresses three actively exploited iOS zero-days
Apple released iOS 14.2 that addressed three zero-day vulnerabilities in its mobile OS that have been abused in attacks in the wild. Apple has addressed three iOS zero-day vulnerabilities actively […]
In the Midst of the Pandemic, Cybersecurity Professionals Show an Uptick in Job, Salary Satisfaction Despite High Stress Levels
By Samantha Humphries, security strategist, Exabeam Interested in a career in cybersecurity — or are you wondering what your peers in the space are thinking? Exabeam’s 2020 Cybersecurity Professionals Salary, […]