Yearly Archives: 2020

For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge

By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge

Patched Minimizes Risk – But Opens the Door for Compatibility Problems

How to Remediate Federal Systems with Zerologon Vulnerability By Egon Rinderer, Global Vice President of Technology & Federal CTO, Tanium In September, the Cybersecurity and Infrastructure Security Agency (CISA) released […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Patched Minimizes Risk – But Opens the Door for Compatibility Problems

Magecart May Make Holidays Less Merry

Third-party plug-ins driving most retail sites can open doors to attackers by Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks In the unprecedented year of 2020, the rise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Magecart May Make Holidays Less Merry

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

Readiness and Risk Exposure in the New Normal

By Cyber Defense Magazine News Staff A recent report conducted by Osterman Research and sponsored by TrapX Security­[1] provides valuable insights on the problems facing cybersecurity professionals in protecting their […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Readiness and Risk Exposure in the New Normal

Nations Not Individuals Are After Your Intellectual Property (IP)

by Ryan Benner, Vice President of Presales,  Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian […]

Posted in Cyber Security News, Featured | Comments Off on Nations Not Individuals Are After Your Intellectual Property (IP)

How to Keep Your Children Safe in Remote Learning Situations

By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , , , , , , , , | Comments Off on How to Keep Your Children Safe in Remote Learning Situations

Office 365 phishing campaign leverages Oracle and Amazon cloud services

Experts warn of a new sophisticated phishing scheme for stealing Office 365 credentials from small and medium-sized businesses in the U.S. The new sophisticated phishing scheme was implemented by threat […]

Posted in Cyber Security News | Comments Off on Office 365 phishing campaign leverages Oracle and Amazon cloud services

A critical flaw in industrial automation systems opens to remote hack

Experts found a critical flaw in Real-Time Automation’s (RTA) 499ES EtherNet/IP stack that could allow hacking industrial control systems. Tracked as CVE-2020-25159, the flaw is rated 9.8 out of 10 in […]

Posted in Cyber Security News | Comments Off on A critical flaw in industrial automation systems opens to remote hack

Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

Unlocking the Promise of Packet Capture

By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Unlocking the Promise of Packet Capture

The Serverless Security Machine

By Art  Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Serverless Security Machine

Cybersecurity Best Practices for End Users

By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Cybersecurity Best Practices for End Users

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Halting Hackers on the Holidays

Expert tips for keeping your information safe while you shop online Commentary As we approach major holidays, with Black Friday and Cyber Monday right around the corner and a massive increase in […]

Posted in Cyber Security News | Comments Off on Halting Hackers on the Holidays

Emotet Attacks Surge in 2020, but Could Be Prevented

By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Emotet Attacks Surge in 2020, but Could Be Prevented

New Grelos skimmer variant reveals murkiness in tracking Magecart operations

Security experts from RiskIQ discovered a new variant of the Grelos skimmer that presents overlap with Magecart group operations. Researchers from RiskIQ analyzed the increased overlap of a new variant of the […]

Posted in Cyber Security News | Comments Off on New Grelos skimmer variant reveals murkiness in tracking Magecart operations

Behind the Scenes of AppSec’s Misalignment

There’s something to be heard in the conversation. By John Worrall, CEO at ZeroNorth We live in a world defined by software, which is precisely why it must be secure. […]

Posted in Cyber Security News | Comments Off on Behind the Scenes of AppSec’s Misalignment

Has Your Data Been Leaked to the Dark Web?

By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Has Your Data Been Leaked to the Dark Web?

Three Educational Cyber Security Steps for The Protection of Your Personal Data

1. Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen and abused. […]

Posted in Cyber Security News, Featured | Comments Off on Three Educational Cyber Security Steps for The Protection of Your Personal Data

Data Migration Security

WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Data Migration Security

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X