Monthly Archives: May 2022

The Emergence of Dynamic Threat Hunting

A review of the evolving cyber security industry over 15 years in business By James “Jim” McMurry, CEO / Founder, Milton Security, Inc. No one can argue that cyber security […]

Posted in Cyber Security News | Comments Off on The Emergence of Dynamic Threat Hunting

Bosch Aishield To Protect AI Systems and Bolster Digital Trust

Bosch AIShield was recently unveiled at CES 2022 as an industry-first & patented AI Security SaaS offering to protect AI systems against emerging security threats By Manoj Parmar, Global Program […]

Posted in Cyber Security News | Comments Off on Bosch Aishield To Protect AI Systems and Bolster Digital Trust

Cybersecurity Doesn’t Have to be a Game of Last Man Standing

Nor should tackling cybersecurity be a solo mission. Leaning into partnerships and changing where security investments are made may be critical to a more secure future. By John DeSimone, President, […]

Posted in Cyber Security News | Comments Off on Cybersecurity Doesn’t Have to be a Game of Last Man Standing

How The Updated CMMC 2.0 Rule Impacts DoD Contractors

What Small Businesses Must Do to Stay Compliant By Dan Clarke, President of Truyo, and Jeff Sizemore, Chief Governance Officer at Egnyte Every year, the Department of Defense (DoD) relies […]

Posted in Cyber Security News | Comments Off on How The Updated CMMC 2.0 Rule Impacts DoD Contractors

The Future of MFA

Going Beyond Privileged Accounts By François Amigorena, Founder & CEO, IS Decisions Given the current global cyber threat landscape, multi-factor authentication (MFA) is one of the most effective ways to […]

Posted in Cyber Security News | Comments Off on The Future of MFA

Privileged Access Management as a Key Technology for Critical Environments

By Dr. Heiko Klarl, Chief Marketing and Sales Officer, iC Consult Closed gas stations disrupted flight schedules, a nationwide state of emergency: In May 2021, a ransomware attack on the […]

Posted in Cyber Security News | Comments Off on Privileged Access Management as a Key Technology for Critical Environments

Drones And the Battlefield

How Drones Are Transforming Military Operations By Dr. Shaun Passley, Founder, ZenaDrone Recent years have seen a substantial increase in drone spending within the military sector. It’s a cycle of […]

Posted in Cyber Security News | Comments Off on Drones And the Battlefield

Hacking The Cybersecurity Field: How To Get Into Cyber As A Young Adult

“What do you want to be when you grow up?” was the question I heard over and over again as a middle and high school student, but I could never […]

Posted in Cyber Security News, Featured | Comments Off on Hacking The Cybersecurity Field: How To Get Into Cyber As A Young Adult

Cybersecurity’s New Frontier: Space

By Duncan Jones, Head of Cybersecurity, Quantinuum Ground-to-space communication is not an area that immediately comes to mind as a target for cyber attacks, and yet securing reliable communication to […]

Posted in Cyber Security News | Comments Off on Cybersecurity’s New Frontier: Space

Ethical AI – How is AI Redefining the Insurance Industry?

By Antoine de Langlois, Responsible AI Data Scientist at Zelros When Cybersecurity meets Artificial Intelligence, companies and organizations have many new challenges and potential threats to consider. Here are some […]

Posted in Cyber Security News | Comments Off on Ethical AI – How is AI Redefining the Insurance Industry?

Why And How to Eliminate Security’s Biggest Blind Spot: Transport Layer Security (TLS)

Gigamon VP breaks down how to eliminate TLS, and considerations for a decryption and encryption approach By Bassam Khan, VP of Product and Technical Marketing Engineering, Gigamon Many who work […]

Posted in Cyber Security News | Comments Off on Why And How to Eliminate Security’s Biggest Blind Spot: Transport Layer Security (TLS)

The Best Cyber Security Jobs in The UK According to Data

By Karim Adib, Data Analyst, The SEO Works According to a report commissioned by the UK government, 82% of job openings advertised online across the UK require digital skills. The […]

Posted in Cyber Security News | Comments Off on The Best Cyber Security Jobs in The UK According to Data

True Cybersecurity Requires a Shift to A Data-Centric Philosophy

By Brian Platz, CEO and co-founder, Fluree A target-rich environment While news of cyber attacks emanating from Russia’s invasion of Ukraine has been sparse, some experts say the cyber conflict […]

Posted in Cyber Security News | Comments Off on True Cybersecurity Requires a Shift to A Data-Centric Philosophy

Interview with Morten Kjaersgaard, CEO of Heimdal Security on How Cybersecurity Businesses are Tackling the Ukraine Crisis

By Morten Kjaersgaard, CEO, Heimdal Security How are cybersecurity companies reacting to the Russia-Ukraine conflict and what would be the best approach, in your opinion? Reactions really seem to vary […]

Posted in Cyber Security News | Comments Off on Interview with Morten Kjaersgaard, CEO of Heimdal Security on How Cybersecurity Businesses are Tackling the Ukraine Crisis

Preventing Ransomware Attacks On Industrial Networks

By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware attacks have been growing steadily for the past two years — with […]

Posted in Cyber Security News | Comments Off on Preventing Ransomware Attacks On Industrial Networks

Data-centric Security: Defense in Depth

By Amit Shaked, CEO, Laminar Last year, organizations saw the highest average cost of a data breach in 17 years, with costs rising from $3.86 million USD in 2020 to […]

Posted in Cyber Security News | Comments Off on Data-centric Security: Defense in Depth

A Resilience-Centered Approach to Cybersecurity

By Safi Raza, Director of Cybersecurity, Fusion Risk Management If there was ever a year for an organization to ensure its cybersecurity was robustly planned, prepared and tested, this is […]

Posted in Cyber Security News | Comments Off on A Resilience-Centered Approach to Cybersecurity

How To Establish SAP Security

By Christoph Nagy, CEO, SecurityBridge Malicious external cyber-threats certainly grab the headlines and leave businesses with no doubt as to the potential havoc they can cause. However, what can inflict […]

Posted in Cyber Security News | Comments Off on How To Establish SAP Security

Why Access Control Is Critical in The Path to Cyber Insurance Readiness

Combatting the challenges of cyber insurance By Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea Cyber insurance is just like any other insurance policy. It helps businesses to […]

Posted in Cyber Security News | Comments Off on Why Access Control Is Critical in The Path to Cyber Insurance Readiness

Tips for Implementing HITRUST for Healthcare Providers

By Philip Jones, Mazars, Director of Security – Chief Information Security Officer (CISO), Data Privacy Officer (DPO) for Healthcare The need for effective and quality healthcare services has never been […]

Posted in Cyber Security News | Comments Off on Tips for Implementing HITRUST for Healthcare Providers

The Countdown Has Started on Secure IoT Compliance

By Kyle Haefner, Lead Security Architect, CableLabs, Bruno Johnson, CEO, Cascoda, Joe Lomako, Cybersecurity Lead, TÜV SÜD UK test lab Internet of Things (IoT) security, like global warming, is one […]

Posted in Cyber Security News | Comments Off on The Countdown Has Started on Secure IoT Compliance

Defending Your Remote Workforce with Zero Trust Security

By Raul Popa, CEO & Co-founder, TypingDNA To truly understand zero trust, you must rethink your mindset of cyber security. For years, security teams followed a simple code: “Trust, but […]

Posted in Cyber Security News | Comments Off on Defending Your Remote Workforce with Zero Trust Security

5 Key Learnings from Intel’s 2021 Product Security Report

By Jerry Bryant, Senior Director of Security Communications and Incident Response at Intel As security threats continue to get more complex, attackers are increasingly targeting hardware to exploit software. As […]

Posted in Cyber Security News | Comments Off on 5 Key Learnings from Intel’s 2021 Product Security Report

Gone Phishing: How Ransomware, Log4j, and Other Exploits Use Your Network to Catch the Big Fish

Ransomware and Log4j are the latest examples of the ways cyber criminals leverage security weaknesses to spread onto networks and steal or extort large paydays. By Peter Bookman, Founder, and […]

Posted in Cyber Security News | Comments Off on Gone Phishing: How Ransomware, Log4j, and Other Exploits Use Your Network to Catch the Big Fish

Understanding Russian Hacking Tactics to Power Up Security in the Energy Sector

By Chip Epps, VP of Product Marketing, OPSWAT Every critical infrastructure sector depends on energy to operate, yet the energy industry reports one of the highest rates of cyber incidents. […]

Posted in Cyber Security News | Comments Off on Understanding Russian Hacking Tactics to Power Up Security in the Energy Sector

Vulnerable Today, Hacked Tomorrow: How a Lack of OT Cybersecurity Affects Critical Infrastructure

By Ian Bramson, Global Head of Industrial Cybersecurity at ABS Group Did you know almost 50% of ICS (Industrial Control Systems) organizations don’t have dedicated 24/7 security to manage Operational […]

Posted in Cyber Security News | Comments Off on Vulnerable Today, Hacked Tomorrow: How a Lack of OT Cybersecurity Affects Critical Infrastructure

Shrinking the Cyber Skills Gap by Taking Advantage of Diversity, Unique Opportunities, and Automation

By Jon Check, senior director of cyber protection solutions, Raytheon Intelligence & Space As cyber threats continue to grow, we will see ransomware attacks become more directed towards companies that […]

Posted in Cyber Security News, Featured | Comments Off on Shrinking the Cyber Skills Gap by Taking Advantage of Diversity, Unique Opportunities, and Automation

It’s time for Internet Providers to Become Primary Security Providers

Consumers want cybersecurity protection and they consider their CSPs as potential partners By Barry Spielman, Director of Product Marketing, Allot Most people are utterly unprepared for cyberattacks. Most people will […]

Posted in Cyber Security News, Featured | Comments Off on It’s time for Internet Providers to Become Primary Security Providers

Why Do You Need a Malware Sandbox?

By ANY.RUN Team To solve the problem of identifying previously unknown malware samples help malware sandboxes – protection systems that allow you to evaluate the security of software by running […]

Posted in Cyber Security News | Comments Off on Why Do You Need a Malware Sandbox?

Will Multi-Factor Authentication (MFA) Implementation Protect Countries from Cybercriminals?

By Marcin Szary, CTO and co-founder,  Secfense American Login.gov service, the UK National Health Services Login application, the Czech DNS registry, the Swedish educational system eduID. These are just a […]

Posted in Cyber Security News | Comments Off on Will Multi-Factor Authentication (MFA) Implementation Protect Countries from Cybercriminals?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X