Monthly Archives: August 2022

EVERYONE is Part of the Security Team and Solution

By Jim Nitterauer, Director of Information Security, Graylog Often, companies approach cybersecurity as a technology problem, forgetting that people and processes are also part of defending against threats. It’s important […]

Posted in Cyber Security News | Comments Off on EVERYONE is Part of the Security Team and Solution

Cyber Insurance: a fast-changing landscape

Focus on the evolving cyber insurance market in Europe for businesses, and the key factors that companies looking to buy cyber cover need to be aware of to make sure […]

Posted in Cyber Security News | Comments Off on Cyber Insurance: a fast-changing landscape

Crisis Point

How the skills shortage is threatening cyber security By Jamal Elmellas, COO, Focus-on-Security Finding sufficient talent has been a real problem in the cybersecurity sector for many years but, with […]

Posted in Cyber Security News | Comments Off on Crisis Point

Content Anarchy: The Lurking Security Risk in A Digital-First World

By Ellen Benaim, Chief Information Security Officer, Templafy More than two years since the onset of the pandemic, remote and hybrid workplaces are here to stay. Research late last year […]

Posted in Cyber Security News | Comments Off on Content Anarchy: The Lurking Security Risk in A Digital-First World

Collective Resilience in an Era of Data Traps, Digital Borders, and Techtonic Geopolitical Shifts

By Andrea Little Limbago, SVP Research & Analysis, Interos The technological explosion of the last few decades has not been accompanied by a similar modernization of global digital policies and […]

Posted in Cyber Security News | Comments Off on Collective Resilience in an Era of Data Traps, Digital Borders, and Techtonic Geopolitical Shifts

Cyber Risk Management: The Right Approach Is a Business-Oriented Approach

By Michael Maggio, CEO & Chief Product Officer of Reciprocity As rates of cyberattacks continue to increase – and organizations continue to grapple with how effectively they are protecting themselves […]

Posted in Cyber Security News | Comments Off on Cyber Risk Management: The Right Approach Is a Business-Oriented Approach

Cyber EO One Year Later: Feds Weigh in On Progress, Areas For Improvement

By Brittany Johnston, Research Director, MeriTalk In May 2021, President Biden issued the Executive Order on Improving the Nation’s Cybersecurity (cyber EO), which included technology guidance and mandates pushing Federal […]

Posted in Cyber Security News | Comments Off on Cyber EO One Year Later: Feds Weigh in On Progress, Areas For Improvement

As The Pandemic Persists, Hospitals Face New Cyber Vulnerabilities

By Jack Chapman, VP of Threat Intelligence, Egress Software Regardless of where you are, local hospitals are a vital part of every community. More so than at any point in […]

Posted in Cyber Security News | Comments Off on As The Pandemic Persists, Hospitals Face New Cyber Vulnerabilities

Apes Gone Phishing

BAYC Attack Leads to $250,000 Loss By Ronghui Gu, CEO and cofounder at CertiK NFTs are one of the most headline-grabbing topics in web3, with the most popular being sold […]

Posted in Cyber Security News | Comments Off on Apes Gone Phishing

A Modern Cybersecurity Fight Requires a Modern Approach to Regulatory Oversight

By Charlie Moskowitz, Vice President, Policy and Public Sector at SecurityScorecard Cybercriminals never stop. Often they are supported, tacitly or explicitly, by a nation-state, pitting individual company security executives against […]

Posted in Cyber Security News | Comments Off on A Modern Cybersecurity Fight Requires a Modern Approach to Regulatory Oversight

3 Ways Asset Management Companies Can Reduce Cyber Risk

Fund managers should not get caught out thinking they are a low-priority target: here’s how to identify risks and build resilience, to protect investor data and assets By Roland Thomas, […]

Posted in Cyber Security News | Comments Off on 3 Ways Asset Management Companies Can Reduce Cyber Risk

Zero Trust: Security Model for A Fluid Perimeter

By Debanjali Ghosh, Technical Evangelist, ManageEngine The concept of a network being fully enclosed within a building, and therefore easier to defend is gone. Recent trends in cloud computing, BYOD, […]

Posted in Cyber Security News | Comments Off on Zero Trust: Security Model for A Fluid Perimeter

The Emergence of Dynamic Threat Hunting

A review of the evolving cyber security industry over 15 years in business By James “Jim” McMurry, CEO / Founder, Milton Security, Inc. No one can argue that cyber security […]

Posted in Cyber Security News | Comments Off on The Emergence of Dynamic Threat Hunting

Securing Your Organization During Global Turmoil

Repelling Cyber Criminals Trying to Capitalize on a Crisis By Kevin Orr, President, RSA Federal Current geopolitical crises unfolding around the globe have far-reaching implications. In just a few short […]

Posted in Cyber Security News | Comments Off on Securing Your Organization During Global Turmoil

Safeguarding Industrial Control Systems Environments

Preventing internal & external cybersecurity breaches with zero trust OT network segmentation By Ryan Lung, Senior product manager at TXOne Networks In the last years, malicious actors have threatened organizations […]

Posted in Cyber Security News | Comments Off on Safeguarding Industrial Control Systems Environments

It’s Time to Rethink Endpoint Security

By Carolyn Crandall, Chief Security Advocate, Attivo Networks Sometimes, organizations change from within, while other times change is thrust upon them—and fast. The COVID-19 pandemic is an excellent example of […]

Posted in Cyber Security News | Comments Off on It’s Time to Rethink Endpoint Security

Protect Your Executives’ Personal Digital Lives to Protect Your Company

By Dr Chris Pierson, BlackCloak Founder & CEO Earlier this year, news broke that Chinese hackers had been caught sending sophisticated  phishing emails to the personal Gmail accounts of US-government […]

Posted in Cyber Security News | Comments Off on Protect Your Executives’ Personal Digital Lives to Protect Your Company

The Need for Automated Remediation in Saas Security

By Noam Shaar, Co-Founder & CEO, Wing Security For years organizations were leveraging more and more Software-as-a-Service applications to help team members collaborate, improve efficiency, and manage other on-the-job tasks. […]

Posted in Cyber Security News | Comments Off on The Need for Automated Remediation in Saas Security

NFTS Are Cool but Dangerous

By Guy Rosefelt, CPO, Sangfor Technologies NFTs have become very popular with collectors and are more ubiquitous every day.  The idea of owning a one-of-a-kind object even in the digital […]

Posted in Cyber Security News | Comments Off on NFTS Are Cool but Dangerous

Azure PostgreSQL User Databases Were Exposed Due to Critical Vulnerabilities

By Randy Reiter CEO of Don’t Be Breached April, 2022 Microsoft reported that vulnerabilities in its Azure Database for PostgreSQL could have let Hackers gain access to other customers’ databases […]

Posted in Cyber Security News | Comments Off on Azure PostgreSQL User Databases Were Exposed Due to Critical Vulnerabilities

The OT Security Conundrum: Vulnerabilities, Skill Gaps, and Operational Silos

Securing OT Environments from Cyber Threats By Jim Montgomery, Principal Solutions Architect with TXOne Networks Securing operational technology (OT) environments from the latest barrage of vulnerabilities and threats is no […]

Posted in Cyber Security News | Comments Off on The OT Security Conundrum: Vulnerabilities, Skill Gaps, and Operational Silos

Zero Trust Architecture: Adoption, Benefits, and Best Practices

What is Zero Trust security, and what are the benefits? Here’s how to prevent data breaches by staying on top of security with Zero Trust architecture. By Harish Akali, Chief […]

Posted in Cyber Security News | Comments Off on Zero Trust Architecture: Adoption, Benefits, and Best Practices

Why Physical Security Should Be Part of a Cybersecurity Strategy

By David Weingot, Founder and CEO, DMAC Security Our modern world is full of various types of physical and cyber-related threats. The war in Ukraine is ramping up Russian attacks […]

Posted in Cyber Security News | Comments Off on Why Physical Security Should Be Part of a Cybersecurity Strategy

Cybersecurity: Why We’re Stronger Together

Advocating for greater security collaboration between businesses, law enforcement, and government By Nicole Mills, Exhibition Director at Infosecurity Group Cybercrime is on an extremely worrying trajectory. A previous survey of […]

Posted in Cyber Security News | Comments Off on Cybersecurity: Why We’re Stronger Together

Great Power Brings Great Responsibility: How to Keep Cloud Databases Secure in an Uncertain World

By Bryan Alsdorf, Director of IT and Head of Information Security, MariaDB Corporation To paraphrase a mantra popularized by Spider-Man: With great power comes great responsibility. It may sound corny. […]

Posted in Cyber Security News | Comments Off on Great Power Brings Great Responsibility: How to Keep Cloud Databases Secure in an Uncertain World

To Secure Saas, Combine Top Compliance Frameworks with An SSPM

The explosion in the number and variety of SaaS apps used by enterprises has created both opportunities and challenges. While the cybersecurity department’s mission is to ensure that their security […]

Posted in Cyber Security News | Comments Off on To Secure Saas, Combine Top Compliance Frameworks with An SSPM

Barriers To Entry Must Be Brought Down If More Women Are to Enter Cybersecurity

By Sydney Asensio, Head of Operations at 2020 Partners As a woman who has recently entered the cybersecurity field, I can safely say that I viewed it as an intimidating, […]

Posted in Cyber Security News | Comments Off on Barriers To Entry Must Be Brought Down If More Women Are to Enter Cybersecurity

The greatest threat to our critical infrastructure: Fortune 1000 employees

A new SpyCloud report finds critical infrastructure companies struggle with password hygiene and rampant malware infections. By Joel Bagnal, Director, Federal – SpyCloud Global cyber threats are on the rise, […]

Posted in Cyber Security News | Comments Off on The greatest threat to our critical infrastructure: Fortune 1000 employees

eSentire Discovers Hackers Spearphishing Hiring Managers with Resumes Poisoned with More_Eggs Malware

By Keegan Keplinger, Research and Reporting Lead, Threat Response Unit, eSentire In March eSentire’s security research team, the Threat Response Unit (TRU), discovered that the stealthy more_eggs malware had re-emerged […]

Posted in Cyber Security News | Comments Off on eSentire Discovers Hackers Spearphishing Hiring Managers with Resumes Poisoned with More_Eggs Malware

What Makes A USB Bad – And How Should Organizations Resolve This Risk?

When ransomware can attack organizations via USB drives and cables, best practice backup and security becomes even more critical By Jon Fielding, Managing Director, EMEA Apricorn Earlier this year, the […]

Posted in Cyber Security News | Comments Off on What Makes A USB Bad – And How Should Organizations Resolve This Risk?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X