Monthly Archives: August 2022
EVERYONE is Part of the Security Team and Solution
By Jim Nitterauer, Director of Information Security, Graylog Often, companies approach cybersecurity as a technology problem, forgetting that people and processes are also part of defending against threats. It’s important […]
Cyber Insurance: a fast-changing landscape
Focus on the evolving cyber insurance market in Europe for businesses, and the key factors that companies looking to buy cyber cover need to be aware of to make sure […]
Crisis Point
How the skills shortage is threatening cyber security By Jamal Elmellas, COO, Focus-on-Security Finding sufficient talent has been a real problem in the cybersecurity sector for many years but, with […]
Content Anarchy: The Lurking Security Risk in A Digital-First World
By Ellen Benaim, Chief Information Security Officer, Templafy More than two years since the onset of the pandemic, remote and hybrid workplaces are here to stay. Research late last year […]
Collective Resilience in an Era of Data Traps, Digital Borders, and Techtonic Geopolitical Shifts
By Andrea Little Limbago, SVP Research & Analysis, Interos The technological explosion of the last few decades has not been accompanied by a similar modernization of global digital policies and […]
Cyber Risk Management: The Right Approach Is a Business-Oriented Approach
By Michael Maggio, CEO & Chief Product Officer of Reciprocity As rates of cyberattacks continue to increase – and organizations continue to grapple with how effectively they are protecting themselves […]
Cyber EO One Year Later: Feds Weigh in On Progress, Areas For Improvement
By Brittany Johnston, Research Director, MeriTalk In May 2021, President Biden issued the Executive Order on Improving the Nation’s Cybersecurity (cyber EO), which included technology guidance and mandates pushing Federal […]
As The Pandemic Persists, Hospitals Face New Cyber Vulnerabilities
By Jack Chapman, VP of Threat Intelligence, Egress Software Regardless of where you are, local hospitals are a vital part of every community. More so than at any point in […]
Apes Gone Phishing
BAYC Attack Leads to $250,000 Loss By Ronghui Gu, CEO and cofounder at CertiK NFTs are one of the most headline-grabbing topics in web3, with the most popular being sold […]
A Modern Cybersecurity Fight Requires a Modern Approach to Regulatory Oversight
By Charlie Moskowitz, Vice President, Policy and Public Sector at SecurityScorecard Cybercriminals never stop. Often they are supported, tacitly or explicitly, by a nation-state, pitting individual company security executives against […]
3 Ways Asset Management Companies Can Reduce Cyber Risk
Fund managers should not get caught out thinking they are a low-priority target: here’s how to identify risks and build resilience, to protect investor data and assets By Roland Thomas, […]
Zero Trust: Security Model for A Fluid Perimeter
By Debanjali Ghosh, Technical Evangelist, ManageEngine The concept of a network being fully enclosed within a building, and therefore easier to defend is gone. Recent trends in cloud computing, BYOD, […]
The Emergence of Dynamic Threat Hunting
A review of the evolving cyber security industry over 15 years in business By James “Jim” McMurry, CEO / Founder, Milton Security, Inc. No one can argue that cyber security […]
Securing Your Organization During Global Turmoil
Repelling Cyber Criminals Trying to Capitalize on a Crisis By Kevin Orr, President, RSA Federal Current geopolitical crises unfolding around the globe have far-reaching implications. In just a few short […]
Safeguarding Industrial Control Systems Environments
Preventing internal & external cybersecurity breaches with zero trust OT network segmentation By Ryan Lung, Senior product manager at TXOne Networks In the last years, malicious actors have threatened organizations […]
It’s Time to Rethink Endpoint Security
By Carolyn Crandall, Chief Security Advocate, Attivo Networks Sometimes, organizations change from within, while other times change is thrust upon them—and fast. The COVID-19 pandemic is an excellent example of […]
Protect Your Executives’ Personal Digital Lives to Protect Your Company
By Dr Chris Pierson, BlackCloak Founder & CEO Earlier this year, news broke that Chinese hackers had been caught sending sophisticated phishing emails to the personal Gmail accounts of US-government […]
The Need for Automated Remediation in Saas Security
By Noam Shaar, Co-Founder & CEO, Wing Security For years organizations were leveraging more and more Software-as-a-Service applications to help team members collaborate, improve efficiency, and manage other on-the-job tasks. […]
NFTS Are Cool but Dangerous
By Guy Rosefelt, CPO, Sangfor Technologies NFTs have become very popular with collectors and are more ubiquitous every day. The idea of owning a one-of-a-kind object even in the digital […]
Azure PostgreSQL User Databases Were Exposed Due to Critical Vulnerabilities
By Randy Reiter CEO of Don’t Be Breached April, 2022 Microsoft reported that vulnerabilities in its Azure Database for PostgreSQL could have let Hackers gain access to other customers’ databases […]
The OT Security Conundrum: Vulnerabilities, Skill Gaps, and Operational Silos
Securing OT Environments from Cyber Threats By Jim Montgomery, Principal Solutions Architect with TXOne Networks Securing operational technology (OT) environments from the latest barrage of vulnerabilities and threats is no […]
Zero Trust Architecture: Adoption, Benefits, and Best Practices
What is Zero Trust security, and what are the benefits? Here’s how to prevent data breaches by staying on top of security with Zero Trust architecture. By Harish Akali, Chief […]
Why Physical Security Should Be Part of a Cybersecurity Strategy
By David Weingot, Founder and CEO, DMAC Security Our modern world is full of various types of physical and cyber-related threats. The war in Ukraine is ramping up Russian attacks […]
Cybersecurity: Why We’re Stronger Together
Advocating for greater security collaboration between businesses, law enforcement, and government By Nicole Mills, Exhibition Director at Infosecurity Group Cybercrime is on an extremely worrying trajectory. A previous survey of […]
Great Power Brings Great Responsibility: How to Keep Cloud Databases Secure in an Uncertain World
By Bryan Alsdorf, Director of IT and Head of Information Security, MariaDB Corporation To paraphrase a mantra popularized by Spider-Man: With great power comes great responsibility. It may sound corny. […]
To Secure Saas, Combine Top Compliance Frameworks with An SSPM
The explosion in the number and variety of SaaS apps used by enterprises has created both opportunities and challenges. While the cybersecurity department’s mission is to ensure that their security […]
Barriers To Entry Must Be Brought Down If More Women Are to Enter Cybersecurity
By Sydney Asensio, Head of Operations at 2020 Partners As a woman who has recently entered the cybersecurity field, I can safely say that I viewed it as an intimidating, […]
The greatest threat to our critical infrastructure: Fortune 1000 employees
A new SpyCloud report finds critical infrastructure companies struggle with password hygiene and rampant malware infections. By Joel Bagnal, Director, Federal – SpyCloud Global cyber threats are on the rise, […]
eSentire Discovers Hackers Spearphishing Hiring Managers with Resumes Poisoned with More_Eggs Malware
By Keegan Keplinger, Research and Reporting Lead, Threat Response Unit, eSentire In March eSentire’s security research team, the Threat Response Unit (TRU), discovered that the stealthy more_eggs malware had re-emerged […]
What Makes A USB Bad – And How Should Organizations Resolve This Risk?
When ransomware can attack organizations via USB drives and cables, best practice backup and security becomes even more critical By Jon Fielding, Managing Director, EMEA Apricorn Earlier this year, the […]