Monthly Archives: July 2022

aiXDR Brief

By Randy Blasik, V.P. of Technology Solutions, Seceon Inc. Introduction. aiXDR with its, novel approach focusing on detecting and stopping threats in all vectors automatically before data is compromised, has […]

Posted in Cyber Security News | Comments Off on aiXDR Brief

Businesses Will Suffer Cyber-Attacks; But Do They Know the Real Cost?

By Reuven Aronashvili, Founder & Chief Executive Officer at CYE In 2021 the number of ransomware attacks doubled, the number of supply chain attacks tripled and threats from state-backed hackers […]

Posted in Cyber Security News | Comments Off on Businesses Will Suffer Cyber-Attacks; But Do They Know the Real Cost?

Airports, Bridges, and Beltways

Cyber and Physical Transportation in the Transportation Industry By Alan Cunningham, Journalist, Truth Be Told Like with most other areas of business, government, public safety/service, and society, the transportation system […]

Posted in Cyber Security News | Comments Off on Airports, Bridges, and Beltways

How Much Is Your Data Actually Worth?

By Jamie Wilson, MD & Founder, Cryptoloc Technology Group As our world gets smaller, and our systems for sharing information become increasingly interconnected, breaches are becoming an inevitability. It’s no […]

Posted in Cyber Security News | Comments Off on How Much Is Your Data Actually Worth?

Trends To Ensure Cybersecurity In 2022

By Héctor Guillermo Martínez, President of GM Sectec With the arrival of the pandemic almost 2 years ago, it became clear that companies are increasingly vulnerable to attacks by hackers […]

Posted in Cyber Security News | Comments Off on Trends To Ensure Cybersecurity In 2022

Major Challenges in Cybersecurity and How Seceon helping to Overcome those.

By Chandra S Pandey, Founder & CEO, Seceon Inc. Challenges in Cybersecurity Industry are as dynamic as the changes coming in Technology every day. When the world is growing fast […]

Posted in Cyber Security News | Comments Off on Major Challenges in Cybersecurity and How Seceon helping to Overcome those.

Zero-Trust Architecture Is Incomplete Without Digital Signatures

Zero trust is often mistakenly understood as merely a matter of cybersecurity; however, adhering to zero trust is a crucial factor in agency IT modernization. By Geoff Mroz, Principal Digital […]

Posted in Cyber Security News | Comments Off on Zero-Trust Architecture Is Incomplete Without Digital Signatures

Preventing Ransomware Attacks on Industrial Networks

By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware attacks have been growing steadily for the past two years — with […]

Posted in Cyber Security News | Comments Off on Preventing Ransomware Attacks on Industrial Networks

Welcome To the Datagovops Revolution

By Ani Chaudhuri, CEO, Dasera Sales have SalesOps. Marketing has MarketingOps. Engineering and Security have DevOps, DevSecOps, and SecOps. It’s high time for Data Governance to have DataGovOps. Revisiting Data […]

Posted in Cyber Security News | Comments Off on Welcome To the Datagovops Revolution

Threats Against Critical Infrastructure Are Looming, Agencies Must Safely Modernize OT Systems

Amid Recent Geopolitical Tensions, There Have Been Serious Concerns Regarding the Vulnerability of The United States’ Critical Infrastructure. By Josh Brodbent, Director of Public Sector Solutions Engineering, BeyondTrust The Cybersecurity […]

Posted in Cyber Security News | Comments Off on Threats Against Critical Infrastructure Are Looming, Agencies Must Safely Modernize OT Systems

Are We Shifting Left Enough

By Douglas Kinloch, VP of Business Development, PACE Anti-Piracy The expression “shift left” is rapidly becoming mainstream in discussions about IT and Software security, but what does it actually mean? […]

Posted in Cyber Security News | Comments Off on Are We Shifting Left Enough

Analysing the true threat of Log4j

By Tom McVey, Sales Engineer EMEA, Menlo Security In December 2021 the cybersecurity industry could be found reflecting on another difficult year, defined by further spikes in both the sophistication […]

Posted in Cyber Security News | Comments Off on Analysing the true threat of Log4j

The Password Is Dying. It’s Time for A DNR.

By Lucas Budman, CEO, TruU As old years end and new ones begin, it’s natural to look ahead at the promise and possibility that lie in front of us. What’s […]

Posted in Cyber Security News | Comments Off on The Password Is Dying. It’s Time for A DNR.

Replacing Weak Authentication Methods with Decentralized Security Infrastructure: The Move Towards a Passwordless Future

By Frances Zelazny, CEO of Anonybit Recent advancements in securing online accounts have effectively changed the way many of us envision protecting our digital footprint – with top priorities of […]

Posted in Cyber Security News | Comments Off on Replacing Weak Authentication Methods with Decentralized Security Infrastructure: The Move Towards a Passwordless Future

How to Measure the Success of Your Phishing and Security Awareness Training (PSAT) Program

By Greg Crowley, CISO, eSentire Ransomware and crippling cyberattacks are so pervasive they have permeated our social fabric down to the late night comedy. HBO’s Last Week Tonight with John […]

Posted in Cyber Security News | Comments Off on How to Measure the Success of Your Phishing and Security Awareness Training (PSAT) Program

Darkweb Monitoring

An Indispensable Element of Cyber Risk Management Strategy By Kaustubh Medhe, Head of Research and Intelligence, Cyble As the COVID pandemic rages on and threatens to delay the restoration of […]

Posted in Cyber Security News | Comments Off on Darkweb Monitoring

Acquiring Actionable Knowledge Through Collaboration

Why sharing experiences is critical to the success of cybersecurity By Nicole Mills, Exhibition Director, Infosecurity Group The world is quickly waking up to the true threat of cybercrime. Cyber […]

Posted in Cyber Security News | Comments Off on Acquiring Actionable Knowledge Through Collaboration

The Rapid Development of Endpoint Detection And Response Technology

By Timothy Liu, CTO & Co-founder, Hillstone Networks In tandem with the evolution of security technology, network attacks have become more targeted, concealed, and persistent. To counter this trend, endpoint […]

Posted in Cyber Security News | Comments Off on The Rapid Development of Endpoint Detection And Response Technology

A Guide to Mitigating the Cyber Risks Posed by Refurbished Hardware

An insight into the cyber risks that are potentially posed when investing in refurbished hardware, and an insight into how these potential risks can be prevented and/or tackled. By Eloïse […]

Posted in Cyber Security News | Comments Off on A Guide to Mitigating the Cyber Risks Posed by Refurbished Hardware

Continuous Biometric Authentication Tool Against Account Takeovers

Introducing Graboxy Sentinel By Tamas Zelczer, CEO, Cursor Insight Twenty years ago, it was much more likely to have your identity stolen out in the physical world, but today it […]

Posted in Cyber Security News | Comments Off on Continuous Biometric Authentication Tool Against Account Takeovers

Moving Beyond Budget Battles: The Real Secret to Improving National Cyber Defenses

By Teddra Burgess, SVP, Public Sector, Tanium There’s been no shortage of criticism around President Biden’s new $773 billion defense budget. That’s no surprise, as federal budgets always draw attention […]

Posted in Cyber Security News | Comments Off on Moving Beyond Budget Battles: The Real Secret to Improving National Cyber Defenses

Reshape Security and Embrace Cyber Resilience with Hillstone Networks

By Timothy Liu, CTO & Co-founder, Hillstone Networks Hillstone is a leader in infrastructure protection. We offer a trusted, and cost-effective unified platform for end-to-end visibility, intelligence, and control. In […]

Posted in Cyber Security News | Comments Off on Reshape Security and Embrace Cyber Resilience with Hillstone Networks

Advantage- Disadvantage Analysis for Implementing Cloud Services

Which Methodology Do You Use to Make the Right Decision? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. Numerous organizations are thinking about introducing cloud-based systems or cloud services. […]

Posted in Cyber Security News | Comments Off on Advantage- Disadvantage Analysis for Implementing Cloud Services

Not Slowing Down

The Continuous Threat of Cyber Misconduct and its Impact on Global Industry  By Kimberly Patlis Walsh, President and Managing Director of Corporate Risk Solutions (CRS) In the lead up to […]

Posted in Cyber Security News | Comments Off on Not Slowing Down

The Top Five Reasons You Should Take Operational Technology Cybersecurity Seriously

How to Protect Critical Infrastructure During This Unprecedented Time By Matthew Morris, Global Managing Director, 1898 & Co. The newest trends in political warfare include cyberattacks on infrastructure security with […]

Posted in Cyber Security News | Comments Off on The Top Five Reasons You Should Take Operational Technology Cybersecurity Seriously

Why Enterprises Need to Consolidate and Standardize Access Control

By Gal Helemski, co-founder and CTO, PlainID Today’s digital-centric enterprises need to manage a multitude of access rules across everything from repositories and directories to applications, increasing complexity levels. As […]

Posted in Cyber Security News | Comments Off on Why Enterprises Need to Consolidate and Standardize Access Control

Mitigate Risk by Securing Third Party Software and Environments

Software Security Requires Ongoing Vigilance Against New and Evolving Vulnerabilities  By Tim Kenney, Chief Operating Officer, SOOS Businesses Need Software and Today’s Software is Built with Open Source. Modern businesses […]

Posted in Cyber Security News | Comments Off on Mitigate Risk by Securing Third Party Software and Environments

Firewalls Aren’t Enough to Protect Against Evolving Cyber Threats

By Pat McGarry, CTO, ThreatBlockr The Cybersecurity and Infrastructure Security Agency (CISA) recently added 66 vulnerabilities to its list of known exploited security holes, including a WatchGuard firewall vulnerability exploited […]

Posted in Cyber Security News | Comments Off on Firewalls Aren’t Enough to Protect Against Evolving Cyber Threats

What is Business Email Compromise?

A Guide to CEO Fraud By Shanna Utgard, Senior Cyber Advocate, Defendify “URGENT – Are you available? I need you to take care of a pending invoice from one of […]

Posted in Cyber Security News | Comments Off on What is Business Email Compromise?

Why A “Group of Rivals” Developed A Cybersecurity Taxonomy, And What It Buys You

Advancing Risk Management and Stemming the River of Risk by Adopting the Consistent Taxonomy of Cybersecurity Threats – Cybersecurity’s “Lingua Franca.” By Charlie Miller, Senior Advisor, Shared Assessments, CTPRP, Distinguished […]

Posted in Cyber Security News | Comments Off on Why A “Group of Rivals” Developed A Cybersecurity Taxonomy, And What It Buys You

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X