Monthly Archives: July 2022
aiXDR Brief
By Randy Blasik, V.P. of Technology Solutions, Seceon Inc. Introduction. aiXDR with its, novel approach focusing on detecting and stopping threats in all vectors automatically before data is compromised, has […]
Businesses Will Suffer Cyber-Attacks; But Do They Know the Real Cost?
By Reuven Aronashvili, Founder & Chief Executive Officer at CYE In 2021 the number of ransomware attacks doubled, the number of supply chain attacks tripled and threats from state-backed hackers […]
Airports, Bridges, and Beltways
Cyber and Physical Transportation in the Transportation Industry By Alan Cunningham, Journalist, Truth Be Told Like with most other areas of business, government, public safety/service, and society, the transportation system […]
How Much Is Your Data Actually Worth?
By Jamie Wilson, MD & Founder, Cryptoloc Technology Group As our world gets smaller, and our systems for sharing information become increasingly interconnected, breaches are becoming an inevitability. It’s no […]
Trends To Ensure Cybersecurity In 2022
By Héctor Guillermo Martínez, President of GM Sectec With the arrival of the pandemic almost 2 years ago, it became clear that companies are increasingly vulnerable to attacks by hackers […]
Major Challenges in Cybersecurity and How Seceon helping to Overcome those.
By Chandra S Pandey, Founder & CEO, Seceon Inc. Challenges in Cybersecurity Industry are as dynamic as the changes coming in Technology every day. When the world is growing fast […]
Zero-Trust Architecture Is Incomplete Without Digital Signatures
Zero trust is often mistakenly understood as merely a matter of cybersecurity; however, adhering to zero trust is a crucial factor in agency IT modernization. By Geoff Mroz, Principal Digital […]
Preventing Ransomware Attacks on Industrial Networks
By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware attacks have been growing steadily for the past two years — with […]
Welcome To the Datagovops Revolution
By Ani Chaudhuri, CEO, Dasera Sales have SalesOps. Marketing has MarketingOps. Engineering and Security have DevOps, DevSecOps, and SecOps. It’s high time for Data Governance to have DataGovOps. Revisiting Data […]
Threats Against Critical Infrastructure Are Looming, Agencies Must Safely Modernize OT Systems
Amid Recent Geopolitical Tensions, There Have Been Serious Concerns Regarding the Vulnerability of The United States’ Critical Infrastructure. By Josh Brodbent, Director of Public Sector Solutions Engineering, BeyondTrust The Cybersecurity […]
Are We Shifting Left Enough
By Douglas Kinloch, VP of Business Development, PACE Anti-Piracy The expression “shift left” is rapidly becoming mainstream in discussions about IT and Software security, but what does it actually mean? […]
Analysing the true threat of Log4j
By Tom McVey, Sales Engineer EMEA, Menlo Security In December 2021 the cybersecurity industry could be found reflecting on another difficult year, defined by further spikes in both the sophistication […]
The Password Is Dying. It’s Time for A DNR.
By Lucas Budman, CEO, TruU As old years end and new ones begin, it’s natural to look ahead at the promise and possibility that lie in front of us. What’s […]
Replacing Weak Authentication Methods with Decentralized Security Infrastructure: The Move Towards a Passwordless Future
By Frances Zelazny, CEO of Anonybit Recent advancements in securing online accounts have effectively changed the way many of us envision protecting our digital footprint – with top priorities of […]
How to Measure the Success of Your Phishing and Security Awareness Training (PSAT) Program
By Greg Crowley, CISO, eSentire Ransomware and crippling cyberattacks are so pervasive they have permeated our social fabric down to the late night comedy. HBO’s Last Week Tonight with John […]
Darkweb Monitoring
An Indispensable Element of Cyber Risk Management Strategy By Kaustubh Medhe, Head of Research and Intelligence, Cyble As the COVID pandemic rages on and threatens to delay the restoration of […]
Acquiring Actionable Knowledge Through Collaboration
Why sharing experiences is critical to the success of cybersecurity By Nicole Mills, Exhibition Director, Infosecurity Group The world is quickly waking up to the true threat of cybercrime. Cyber […]
The Rapid Development of Endpoint Detection And Response Technology
By Timothy Liu, CTO & Co-founder, Hillstone Networks In tandem with the evolution of security technology, network attacks have become more targeted, concealed, and persistent. To counter this trend, endpoint […]
A Guide to Mitigating the Cyber Risks Posed by Refurbished Hardware
An insight into the cyber risks that are potentially posed when investing in refurbished hardware, and an insight into how these potential risks can be prevented and/or tackled. By Eloïse […]
Continuous Biometric Authentication Tool Against Account Takeovers
Introducing Graboxy Sentinel By Tamas Zelczer, CEO, Cursor Insight Twenty years ago, it was much more likely to have your identity stolen out in the physical world, but today it […]
Moving Beyond Budget Battles: The Real Secret to Improving National Cyber Defenses
By Teddra Burgess, SVP, Public Sector, Tanium There’s been no shortage of criticism around President Biden’s new $773 billion defense budget. That’s no surprise, as federal budgets always draw attention […]
Reshape Security and Embrace Cyber Resilience with Hillstone Networks
By Timothy Liu, CTO & Co-founder, Hillstone Networks Hillstone is a leader in infrastructure protection. We offer a trusted, and cost-effective unified platform for end-to-end visibility, intelligence, and control. In […]
Advantage- Disadvantage Analysis for Implementing Cloud Services
Which Methodology Do You Use to Make the Right Decision? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. Numerous organizations are thinking about introducing cloud-based systems or cloud services. […]
Not Slowing Down
The Continuous Threat of Cyber Misconduct and its Impact on Global Industry By Kimberly Patlis Walsh, President and Managing Director of Corporate Risk Solutions (CRS) In the lead up to […]
The Top Five Reasons You Should Take Operational Technology Cybersecurity Seriously
How to Protect Critical Infrastructure During This Unprecedented Time By Matthew Morris, Global Managing Director, 1898 & Co. The newest trends in political warfare include cyberattacks on infrastructure security with […]
Why Enterprises Need to Consolidate and Standardize Access Control
By Gal Helemski, co-founder and CTO, PlainID Today’s digital-centric enterprises need to manage a multitude of access rules across everything from repositories and directories to applications, increasing complexity levels. As […]
Mitigate Risk by Securing Third Party Software and Environments
Software Security Requires Ongoing Vigilance Against New and Evolving Vulnerabilities By Tim Kenney, Chief Operating Officer, SOOS Businesses Need Software and Today’s Software is Built with Open Source. Modern businesses […]
Firewalls Aren’t Enough to Protect Against Evolving Cyber Threats
By Pat McGarry, CTO, ThreatBlockr The Cybersecurity and Infrastructure Security Agency (CISA) recently added 66 vulnerabilities to its list of known exploited security holes, including a WatchGuard firewall vulnerability exploited […]
What is Business Email Compromise?
A Guide to CEO Fraud By Shanna Utgard, Senior Cyber Advocate, Defendify “URGENT – Are you available? I need you to take care of a pending invoice from one of […]
Why A “Group of Rivals” Developed A Cybersecurity Taxonomy, And What It Buys You
Advancing Risk Management and Stemming the River of Risk by Adopting the Consistent Taxonomy of Cybersecurity Threats – Cybersecurity’s “Lingua Franca.” By Charlie Miller, Senior Advisor, Shared Assessments, CTPRP, Distinguished […]