Monthly Archives: February 2022

Data Security Must Be a Priority as Employees Quit in Record Numbers

By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5 […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Data Security Must Be a Priority as Employees Quit in Record Numbers

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

Detect Ransomware Data Exfiltration Immediately

By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site workforce has resulted in new security concerns since hackers now have many […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Detect Ransomware Data Exfiltration Immediately

Why Ransomware is Only a Symptom of a Larger Problem

While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Why Ransomware is Only a Symptom of a Larger Problem

5 Ways to Protect Your Workplace from Cybersecurity Threats

The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and hackers to exploit data security flaws. By Nicole Allen, Marketing Executive, Salt […]

Posted in Cyber Security News | Tagged , , , | Comments Off on 5 Ways to Protect Your Workplace from Cybersecurity Threats

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

Mitigating Risk from Insider Threats in 2022

By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Mitigating Risk from Insider Threats in 2022

Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per record on the black market, while stolen payment card data is sold […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

Cyber Defense Media Group Launches CyberDefenseCon 2022

On the heels of its 10th anniversary, Cyber Defense Media Group announces the exclusive Cyber Defense Conference for 2022 a.k.a. CyberDefenseCon 2022. This event will be taking place in Orlando, […]

Posted in Cyber Security News, Featured | Comments Off on Cyber Defense Media Group Launches CyberDefenseCon 2022

How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

Understanding Identity Detection and Response

Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might […]

Posted in Cyber Security News | Comments Off on Understanding Identity Detection and Response

Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022

IT’S A BIG, BOLD, BEAUTIFUL 2022 – OUR 10TH ANNIVERSARY  We’re celebrating this milestone every day this year in different, exciting and creative ways. We’re expanding our teams, platforms and […]

Posted in Cyber Security News, Featured | Tagged | Comments Off on Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X