Monthly Archives: June 2022

“Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

The key on the cyber battlefield, like on the traditional military battlefield, is understanding that there will indeed be many battles By Shmulik Yehezkel (Colonel, res), Chief Critical Cyber Operations […]

Posted in Cyber Security News | Comments Off on “Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

It’s time for Internet Providers to Become Primary Security Providers

Consumers want cybersecurity protection, and they consider their CSPs as potential partners By Barry Spielman, Director of Product Marketing, Allot Most people are utterly unprepared for cyberattacks. Most people will […]

Posted in Cyber Security News | Comments Off on It’s time for Internet Providers to Become Primary Security Providers

More Than A “You’ve Been Breached Mentality” – Zero Trust, Quantum Computers, And the Future of Cyber

By Dr. Torsten Saab, Principal Engineering Fellow, Raytheon The 2020 Internet Crime Report includes information from 791,790 complaints of suspected internet crime—an increase of more than 300,000 complaints from 2019 […]

Posted in Cyber Security News | Comments Off on More Than A “You’ve Been Breached Mentality” – Zero Trust, Quantum Computers, And the Future of Cyber

Cybercriminals Use Azure Front Door in Phishing Attacks

Resecurity, Inc. (USA) has identified a spike in phishing content delivered via Azure Front Door (AFD), a cloud CDN service provided by Microsoft. The identified resources in one of the […]

Posted in Cyber Security News | Comments Off on Cybercriminals Use Azure Front Door in Phishing Attacks

Alert Fatigue Puts Your Organization at Risk; Here’s What to Do About It

By Derek Nugent Vice President Sales, Marketing & Customer Success at Difenda Alerts, notifications, and non-stop calls from shady telemarketers pitching extended warranties – we all get more alerts each […]

Posted in Cyber Security News | Comments Off on Alert Fatigue Puts Your Organization at Risk; Here’s What to Do About It

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate […]

Posted in Cyber Security News | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

Security For Want of a Nail

Don’t Overlook Lifecycle and Data Management Details By Gregory Hoffer, CEO, Coviant Software Threat actors are a relentless bunch. They continue to evolve their tools and practices to try and […]

Posted in Cyber Security News | Comments Off on Security For Want of a Nail

How Passwordless Can Help Us Win the Ransomware War

By Hemen Vimadalal is CEO and founder of 1Kosmos Approximately $590 million in ransomware payments were made in the U.S. in the first six months of 2021, more than the […]

Posted in Cyber Security News | Comments Off on How Passwordless Can Help Us Win the Ransomware War

Public Sector Must Remain Diligent as Cloud and Ransomware Intersect

By Rick Vanover, Senior Director of Product Strategy at Veeam Often, when a citizen interacts with a government agency, a piece of personal information is provided and stored. This means […]

Posted in Cyber Security News | Comments Off on Public Sector Must Remain Diligent as Cloud and Ransomware Intersect

How the Cloud Upended Security – and How Encryption Helps Restore It

By Tilo Weigandt, co-founder, Vaultree Data is everywhere and anywhere, and as a result, data management is out of control. Once a user or customer has signed up for a […]

Posted in Cyber Security News | Comments Off on How the Cloud Upended Security – and How Encryption Helps Restore It

Operational Security: How to Get Rid of Digital Footprints On The Internet?

By Viktoria Sokurenko, CMO of Ukrainian start-up X-ray OPSEC (Operational Security) is a term used by US intelligence to describe the analytical process of preventing enemy access to information threatening […]

Posted in Cyber Security News | Comments Off on Operational Security: How to Get Rid of Digital Footprints On The Internet?

Security Gotcha of Consumer and Industrial IoT Devices

By Smit Kadakia, Chief Data Scientist, Seceon Inc. Internet of Things (IoT) and Industrial IoT (IIoT) are not just buzzwords anymore. The broad use of these devices and their impact […]

Posted in Cyber Security News | Comments Off on Security Gotcha of Consumer and Industrial IoT Devices

Responding To High-Level Cyberattacks on A Mid-Level Budget

By Jesper Zerlang, CEO, LogPoint Protecting your business against threat actors is no small task. Not only has the number of cyberattacks increased dramatically during the last year, but attacks […]

Posted in Cyber Security News | Comments Off on Responding To High-Level Cyberattacks on A Mid-Level Budget

Transparency And Collaboration Between Vendors and Customers Are Key to Reducing Third-Party Security Incidents

By Nick Sorensen, CEO of Whistic, Inc. It’s no secret the number of third-party security incidents continues to rise annually. Last year started with the SolarWinds breach, ended with Log4j, […]

Posted in Cyber Security News | Comments Off on Transparency And Collaboration Between Vendors and Customers Are Key to Reducing Third-Party Security Incidents

Defend Your Castle with Zero Trust

Protecting yourself, your company and your data from the vulnerabilities of connectivity is no longer an option, but an imperative. By Peter Oggel, Chief Technology Officer, Irdeto In medieval times, […]

Posted in Cyber Security News | Comments Off on Defend Your Castle with Zero Trust

ONLINE STREAMING- A Harmless Entertainment or a Cybersecurity Hazard

By Shigraf Aijaz, Cybersecurity Journalist and Writer, Be Encrypted The popularity of online streaming has grown significantly in the past few years. In fact, by 2024, the global streaming market […]

Posted in Cyber Security News | Comments Off on ONLINE STREAMING- A Harmless Entertainment or a Cybersecurity Hazard

Control the Uncontrollable, The Path to Supply Chain Security

By Ed Chandler, AE and Cybersecurity Lead, TÜV SÜD America When I was initially asked to write this article, I didn’t hesitate as to what the article should be about.  […]

Posted in Cyber Security News | Comments Off on Control the Uncontrollable, The Path to Supply Chain Security

Biggest Cyber Trend in 2022

You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: a customer is working late at night, been a long day, and […]

Posted in Cyber Security News | Comments Off on Biggest Cyber Trend in 2022

Using Cyber Risk Quantification to Optimize Your Security Budget

By Reuven Aronashvili, CEO and Founder, CYE As cyberattacks continue to increase in size and complexity, it is likely that your organization’s security budget will have to increase as well. […]

Posted in Cyber Security News | Comments Off on Using Cyber Risk Quantification to Optimize Your Security Budget

Cyber Security and Cloud Computing in the New Era of Remote Working

Emerging trends and their security implications By Enrique Gomez – COO GAT Labs In my experience, there have been, perhaps, three major trends with significant security implications for corporate data […]

Posted in Cyber Security News | Comments Off on Cyber Security and Cloud Computing in the New Era of Remote Working

Threat Intelligence: Cyber and Electromagnetic Activities (CEMA) with Software-Defined Radio (SDR)

By Brendon McHugh, FAE & Technical Writer, Per Vices Under the umbrella term Cyber and Electromagnetic Activities (CEMA), a number of military operations must be synchronized and coordinated. This includes […]

Posted in Cyber Security News | Comments Off on Threat Intelligence: Cyber and Electromagnetic Activities (CEMA) with Software-Defined Radio (SDR)

Prevent Browser-In-The-Browser Phishing Attacks by Removing Human Input Error

How companies can combat the threat of new browser-in-the-browser phishing attacks by taking back control of network access and password distribution. By Julia O’Toole, founder, and CEO of MyCena Security […]

Posted in Cyber Security News | Comments Off on Prevent Browser-In-The-Browser Phishing Attacks by Removing Human Input Error

Poor Identity Management Amplifies Ransomware

By David Mahdi, Chief Strategy Officer and CISO Advisor, Sectigo While ransomware is malware, security leaders must go beyond legacy anti-malware approaches to mitigate risk. Ransomware is a data-centric threat; […]

Posted in Cyber Security News | Comments Off on Poor Identity Management Amplifies Ransomware

5 Reasons Why Insider Threat Should Be a Security Priority

By David Barroso, Founder & CEO, CounterCraft Whether it’s the purported 36% of employees that can still access to systems or data of an old employer after leaving a job […]

Posted in Cyber Security News | Comments Off on 5 Reasons Why Insider Threat Should Be a Security Priority

The Growing Risk in Cyber Risk Management

By Andrew Beagley, Chief Risk Officer, OptimEyes.ai Companies often manage cyber risks in functional silos, collect and assess risk data in standalone spreadsheets, and fail to give C-suite execs and […]

Posted in Cyber Security News | Comments Off on The Growing Risk in Cyber Risk Management

Are you maximizing your digital transformation investments with modernized app onboarding?

App Onboarding to an IAM Program Should be Seamless, Automated, Cost-Efficient, and a Highly Secure Experience By Asif Savvas, Chief Product Officer, Simeio The acceleration of digital transformation, brought on by the […]

Posted in Cyber Security News | Comments Off on Are you maximizing your digital transformation investments with modernized app onboarding?

The cost of ransomware: Should you pay the ransom?

By Jamie Wilson, Founder & Managing Director, Cryptoloc It might be the most difficult decision you ever have to make. With the future of your business and the private details […]

Posted in Cyber Security News | Comments Off on The cost of ransomware: Should you pay the ransom?

How to Solve a CISO’s Worst Nightmare

By T.J. Minichillo and Brett Paradis Imagine waking up one morning, checking in and seeing a waterfall of messages from your incident response team, reporting that multiple users can’t access […]

Posted in Cyber Security News | Comments Off on How to Solve a CISO’s Worst Nightmare

The Need for Automated Remediation in SaaS Security

By Noam Shaar, Co-Founder & CEO, Wing Security For years organizations were leveraging more and more Software-as-a-Service applications to help team members collaborate, improve efficiency, and manage other on-the-job tasks. […]

Posted in Cyber Security News | Comments Off on The Need for Automated Remediation in SaaS Security

Protect Your Executives’ Personal Digital Lives to Protect Your Company

By Dr Chris Pierson, BlackCloak Founder & CEO Earlier this year, news broke that Chinese hackers had been caught sending sophisticated  phishing emails to the personal Gmail accounts of US-government […]

Posted in Cyber Security News | Comments Off on Protect Your Executives’ Personal Digital Lives to Protect Your Company

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X