Monthly Archives: May 2022
The Emergence of Dynamic Threat Hunting
A review of the evolving cyber security industry over 15 years in business By James “Jim” McMurry, CEO / Founder, Milton Security, Inc. No one can argue that cyber security […]
Bosch Aishield To Protect AI Systems and Bolster Digital Trust
Bosch AIShield was recently unveiled at CES 2022 as an industry-first & patented AI Security SaaS offering to protect AI systems against emerging security threats By Manoj Parmar, Global Program […]
Cybersecurity Doesn’t Have to be a Game of Last Man Standing
Nor should tackling cybersecurity be a solo mission. Leaning into partnerships and changing where security investments are made may be critical to a more secure future. By John DeSimone, President, […]
How The Updated CMMC 2.0 Rule Impacts DoD Contractors
What Small Businesses Must Do to Stay Compliant By Dan Clarke, President of Truyo, and Jeff Sizemore, Chief Governance Officer at Egnyte Every year, the Department of Defense (DoD) relies […]
The Future of MFA
Going Beyond Privileged Accounts By François Amigorena, Founder & CEO, IS Decisions Given the current global cyber threat landscape, multi-factor authentication (MFA) is one of the most effective ways to […]
Privileged Access Management as a Key Technology for Critical Environments
By Dr. Heiko Klarl, Chief Marketing and Sales Officer, iC Consult Closed gas stations disrupted flight schedules, a nationwide state of emergency: In May 2021, a ransomware attack on the […]
Drones And the Battlefield
How Drones Are Transforming Military Operations By Dr. Shaun Passley, Founder, ZenaDrone Recent years have seen a substantial increase in drone spending within the military sector. It’s a cycle of […]
Hacking The Cybersecurity Field: How To Get Into Cyber As A Young Adult
“What do you want to be when you grow up?” was the question I heard over and over again as a middle and high school student, but I could never […]
Cybersecurity’s New Frontier: Space
By Duncan Jones, Head of Cybersecurity, Quantinuum Ground-to-space communication is not an area that immediately comes to mind as a target for cyber attacks, and yet securing reliable communication to […]
Ethical AI – How is AI Redefining the Insurance Industry?
By Antoine de Langlois, Responsible AI Data Scientist at Zelros When Cybersecurity meets Artificial Intelligence, companies and organizations have many new challenges and potential threats to consider. Here are some […]
Why And How to Eliminate Security’s Biggest Blind Spot: Transport Layer Security (TLS)
Gigamon VP breaks down how to eliminate TLS, and considerations for a decryption and encryption approach By Bassam Khan, VP of Product and Technical Marketing Engineering, Gigamon Many who work […]
The Best Cyber Security Jobs in The UK According to Data
By Karim Adib, Data Analyst, The SEO Works According to a report commissioned by the UK government, 82% of job openings advertised online across the UK require digital skills. The […]
True Cybersecurity Requires a Shift to A Data-Centric Philosophy
By Brian Platz, CEO and co-founder, Fluree A target-rich environment While news of cyber attacks emanating from Russia’s invasion of Ukraine has been sparse, some experts say the cyber conflict […]
Interview with Morten Kjaersgaard, CEO of Heimdal Security on How Cybersecurity Businesses are Tackling the Ukraine Crisis
By Morten Kjaersgaard, CEO, Heimdal Security How are cybersecurity companies reacting to the Russia-Ukraine conflict and what would be the best approach, in your opinion? Reactions really seem to vary […]
Preventing Ransomware Attacks On Industrial Networks
By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware attacks have been growing steadily for the past two years — with […]
Data-centric Security: Defense in Depth
By Amit Shaked, CEO, Laminar Last year, organizations saw the highest average cost of a data breach in 17 years, with costs rising from $3.86 million USD in 2020 to […]
A Resilience-Centered Approach to Cybersecurity
By Safi Raza, Director of Cybersecurity, Fusion Risk Management If there was ever a year for an organization to ensure its cybersecurity was robustly planned, prepared and tested, this is […]
How To Establish SAP Security
By Christoph Nagy, CEO, SecurityBridge Malicious external cyber-threats certainly grab the headlines and leave businesses with no doubt as to the potential havoc they can cause. However, what can inflict […]
Why Access Control Is Critical in The Path to Cyber Insurance Readiness
Combatting the challenges of cyber insurance By Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea Cyber insurance is just like any other insurance policy. It helps businesses to […]
Tips for Implementing HITRUST for Healthcare Providers
By Philip Jones, Mazars, Director of Security – Chief Information Security Officer (CISO), Data Privacy Officer (DPO) for Healthcare The need for effective and quality healthcare services has never been […]
The Countdown Has Started on Secure IoT Compliance
By Kyle Haefner, Lead Security Architect, CableLabs, Bruno Johnson, CEO, Cascoda, Joe Lomako, Cybersecurity Lead, TÜV SÜD UK test lab Internet of Things (IoT) security, like global warming, is one […]
Defending Your Remote Workforce with Zero Trust Security
By Raul Popa, CEO & Co-founder, TypingDNA To truly understand zero trust, you must rethink your mindset of cyber security. For years, security teams followed a simple code: “Trust, but […]
5 Key Learnings from Intel’s 2021 Product Security Report
By Jerry Bryant, Senior Director of Security Communications and Incident Response at Intel As security threats continue to get more complex, attackers are increasingly targeting hardware to exploit software. As […]
Gone Phishing: How Ransomware, Log4j, and Other Exploits Use Your Network to Catch the Big Fish
Ransomware and Log4j are the latest examples of the ways cyber criminals leverage security weaknesses to spread onto networks and steal or extort large paydays. By Peter Bookman, Founder, and […]
Understanding Russian Hacking Tactics to Power Up Security in the Energy Sector
By Chip Epps, VP of Product Marketing, OPSWAT Every critical infrastructure sector depends on energy to operate, yet the energy industry reports one of the highest rates of cyber incidents. […]
Vulnerable Today, Hacked Tomorrow: How a Lack of OT Cybersecurity Affects Critical Infrastructure
By Ian Bramson, Global Head of Industrial Cybersecurity at ABS Group Did you know almost 50% of ICS (Industrial Control Systems) organizations don’t have dedicated 24/7 security to manage Operational […]
Shrinking the Cyber Skills Gap by Taking Advantage of Diversity, Unique Opportunities, and Automation
By Jon Check, senior director of cyber protection solutions, Raytheon Intelligence & Space As cyber threats continue to grow, we will see ransomware attacks become more directed towards companies that […]
It’s time for Internet Providers to Become Primary Security Providers
Consumers want cybersecurity protection and they consider their CSPs as potential partners By Barry Spielman, Director of Product Marketing, Allot Most people are utterly unprepared for cyberattacks. Most people will […]
Why Do You Need a Malware Sandbox?
By ANY.RUN Team To solve the problem of identifying previously unknown malware samples help malware sandboxes – protection systems that allow you to evaluate the security of software by running […]
Will Multi-Factor Authentication (MFA) Implementation Protect Countries from Cybercriminals?
By Marcin Szary, CTO and co-founder, Secfense American Login.gov service, the UK National Health Services Login application, the Czech DNS registry, the Swedish educational system eduID. These are just a […]