Monthly Archives: April 2022
3 Best Practices to Avoid Inevitable Ransomware Attacks
Tips to mitigate and protect against the ongoing threats of ransomware By Jesper Zerlang, CEO, LogPoint The total cost of ransomware in 2021 totals $20B and is expected to climb […]
Can Your Cybersecurity Culture Stand Up to the Latest Spear Phishing Techniques?
By Josh Yavor, Chief Information Security Officer, Tessian Gone are the days of bulk spear phishing attacks, where hackers send scam emails and malicious attachments to as many people as […]
Why MFA Alone Isn’t Enough for True Cybersecurity
By Bojan Simic, Co-Founder, Interim CEO & CTO, HYPR Multi-factor authentication (MFA) was once a foreign terminology, but today, with the myriad of hacks and data breaches dominating headlines, it’s […]
How Covid-19 Changed Advertising Forever
By Bernie Brode, product researcher at Microscopic Machines There has been much written about how the Covid-19 pandemic has exacerbated inequality. Across the world, the virus exposed just how unprepared […]
KB4-CON 2022: Awareness, Behavior and Culture: Trip Report
After two years of virtual events, I was thrilled to attend KB4-CON 2022, run by KnowBe4, Inc., which took place in the Gaylord Palms Resort & Convention Center in Orlando, […]
Cyber Crime Is on The Rise and These Experts Have the Knowledge You Need
By Jon Clemenson, Director of Information Security, TokenEx Nearly every day, there’s news about another major cyberattack on a large organization. We are living in a new reality where organizations […]
9 Ways Social Media Sabotages Your Cybersecurity
By Alex Lysak, CEO of Scanteam Social media has become one of the most common ways to spend time online, with many of the world’s most popular websites offering social […]
When Diplomacy, Finance and Tech Collide: Cybersecurity Lessons Learned from Years Across Careers
By Danny Lopez, CEO, Glasswall While technology, finance, and diplomacy may seem worlds away from one another in most people’s minds, they may be surprised to learn that there is […]
The Security Vulnerabilities Facing Remote Workforces
An organization’s security is only as good as its weakest link By Daniel Hofmann, CEO, Hornetsecurity With work from home and hybrid work arrangements on the rise, employers are increasingly […]
Cybersecurity and Other Top Risk Factors in 2022
By Dan Zitting, Chief Product & Strategy Officer at Diligent As we pass the second anniversary of the onset of the COVID-19 pandemic, it feels as if we’ve arrived at […]
How Companies Can Protect the Country from Acts Of Cyberwarfare
By Matt Lindley, CISO and COO, NINJIO Immediately before the Russian invasion of Ukraine, a form of “wiper” malware targeted the government and financial institutions across the country. Almost two […]
How To Verify Who Is Who in The Digital Space Without Compromising Privacy?
By Nima Schei, MD Founder and CEO, Hummingbirds AI Inc. Digital interactions are rapidly increasing as more and more businesses across sectors have opted to turn digital and go completely […]
Protecting Critical Infrastructure from Cyberattacks Essential if U.S. is to Remain a Superpower
By Jeff Engle, Chairman and President of Conquest Cyber The playbook for geopolitical dominance is being re-written thanks to Russia’s invasion of Ukraine. It will change further if, as many […]
The Rise of Highly Evasive Adaptive Threats – Five Key Insights
By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security The impact of the global pandemic has resulted in a paradigm shift that has drastically expanded attack surfaces, as hybrid […]
An Internet of Things Future Means Securing Entire Supply-Chains
By Nils Gerhardt, Chief Technology Officer for Utimaco The ‘Internet of Things’ (or IoT) is far more than smart speakers and app-connected lightbulbs: in less than a decade it has […]
The Risks and Costs of The Public Sector’s Device Sanitization and Destruction Practices
New report highlights concern over financial costs and environmental impacts associated with device destruction as well as a lack of data sanitization best practices By Alan Bentley, President of Global […]
Detecting And Defending Against Malware Amid Last Year’s Flood of Infostealers
Amid the growing threat of malware, enterprises and employees alike must take responsibility for the dangers of living and working in a digitized world. By Chip Witt, Vice President of […]
Bolstering Business Resiliency with AIOps
By Ajay Gandhi, Vice President of Product Marketing, Dynatrace If the global cyber events of 2021, such as Log4J, taught us anything, it’s that sustaining business operations and bolstering the […]
Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to be fought on two fronts – on the ground and in the ether – […]
Improve Data Security Through Automation
Human error is endemic to data breaches. Process automation can minimize the risk. By Gregory Hoffer, CEO, Coviant Software Human error is the most common cause of a data breach, […]
Cyber Defense Media Group Opens Young Women in Cybersecurity Scholarship for 2022
Cyber Defense Media Group (CDMG), who has launched our 10th annual cybersecurity community awards this year today announced that it has re-opened its annual young Women in Cybersecurity scholarship program […]
Top 10 Node.Js Security Best Practices
Best Security Practices in Nodejs By Harikrishna Kundariya, CEO, eSparkBiz Node.js is one of the most popular frameworks for web and mobile application development. It is JavaScript runtime which works […]
Credential Stuffing; Ny Attorney General Reveals More Than 1.1m Compromised Accounts Discovered
Password-Guessing Is the Attackers’ Latest Weapon of Choice By Ekaterina Khrustaleva, Chief Operating Officer, ImmuniWeb In January 2022, the New York Attorney General Letitia James revealed the results of major […]
Why Now Is the Time to Prepare for The Quantum Threat
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start preparations for the quantum threat today? By Ali El Kaafarani, CEO & […]
The Truth About Data Privacy in Healthcare
Realizing the value of personal data and the risk of connected healthcare as bad actors prevail in their attacks against Healthcare Delivery Organizations (HDOs) By Samuel Hill, Director of Product […]
The Seven Deadly Sins of Blockchain Security
By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology (DLT) is essentially an improved method of record-keeping, one which achieves a consensus shared […]
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat Landscape You can’t ignore the headlines. From the Irish health service to […]
Fighting The International Cyber War with Ai
As Ukraine fights to maintain a stronghold on its besieged capital, cyberattacks are escalating. Governments on both sides of the Atlantic are concerned about a potential full-on cyberwar. By Jarred […]
4 Ways to Improve Azure Active Directory Security
Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis Cloud-led innovation has accelerated the digital transformation of many organizations that have […]
The Quantum Tipping Point
Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential […]