Monthly Archives: October 2022

Scared Of Your Own Shadow IT? Addressing The Top Security Concern Around SaaS Adoption

By Uri Haramati, Co-Founder and CEO of Torii The pandemic struck, and organizations were forced to embrace remote work and cloud applications.  Software-as-a-Service (SaaS) apps like Zoom and Slack kept […]

Posted in Cyber Security News, Featured | Comments Off on Scared Of Your Own Shadow IT? Addressing The Top Security Concern Around SaaS Adoption

Russia’s Invasion of Ukraine Lays Ground for a New Era of Cyberwarfare

Russia is known to be the world’s leading hacking superpower for a reason. The country has an infamous history of executing high impact cyberattacks, often aimed at one of the […]

Posted in Cyber Security News, Featured | Comments Off on Russia’s Invasion of Ukraine Lays Ground for a New Era of Cyberwarfare

Raising the Alarm on DDoS Attacks

By Ivan Shefrin, Executive Director for Managed Security Services at Comcast Business Many organizations underappreciate the risk of distributed denial-of-service (DDoS) attacks, which remain a significant threat to the availability […]

Posted in Cyber Security News, Featured | Comments Off on Raising the Alarm on DDoS Attacks

How To Protect Against The 83 million Cyber Attacks Detected In 2021

The 4 Basic Cybersecurity Practices Experts Say Prevent Most Attacks By CyberLock Defense, Lockton Affinity It’s a familiar message at CyberLock Defense: multi-factor authentication, threat monitoring, response planning and risk […]

Posted in Cyber Security News, Featured | Comments Off on How To Protect Against The 83 million Cyber Attacks Detected In 2021

Micro-Segmentation: Where Does It Fit into Zero Trust?

Micro-Segmentation Is Not Zero Trust Alone Or Vice Versa By Brian Haugli – CEO, SideChannel Micro-segmentation is not Zero Trust. It is the technology component to realize a Zero Trust […]

Posted in Cyber Security News, Featured | Comments Off on Micro-Segmentation: Where Does It Fit into Zero Trust?

Cybersecurity For Our Nation’s Critical Infrastructure

How you can do your part to protect mission-critical assets and services By Kamil Karmali, Global Commercial Manager, Cybersecurity, Rockwell Automation The Cybersecurity and Infrastructure Security Agency (CISA) describes critical infrastructure  as […]

Posted in Cyber Security News, Featured | Comments Off on Cybersecurity For Our Nation’s Critical Infrastructure

Why Throwing Money at Cybersecurity Doesn’t Work

By Zac Amos, Features Editor, ReHack Cyberattacks have become more frequent and debilitating as the work gets more tech-centric. With so many advanced and expensive security tools available, companies should […]

Posted in Cyber Security News, Featured | Comments Off on Why Throwing Money at Cybersecurity Doesn’t Work

Why Cyber-Attacks on The Cloud Are Rising and How to Prevent Them

Increase in implementation of cloud by government and private organizations to improve efficiency and save costs made it the prime target for cyber-criminals. However, taking security measures can enable smooth […]

Posted in Cyber Security News, Featured | Comments Off on Why Cyber-Attacks on The Cloud Are Rising and How to Prevent Them

Why CSOs Are Decluttering Their Cybersecurity Toolboxes

By Motti Elloul, VP Customer Success and Incident Response, Perception Point Slashed budgets, staff shortages, and the significant risks associated with legacy cybersecurity solutions – these reasons and more are […]

Posted in Cyber Security News | Comments Off on Why CSOs Are Decluttering Their Cybersecurity Toolboxes

What We Have Learnt Building a Global Security Conscious Culture

By Nicola McCoy, Chief Information Security Officer at RSM International The growing cyber risk is impacting global businesses of all shapes and sizes as ‘bad actors’ develop more sophisticated and […]

Posted in Cyber Security News, Featured | Comments Off on What We Have Learnt Building a Global Security Conscious Culture

Using Identity for Access Is a Huge Cybersecurity Risk

Why FIDO’s proposal to use identification for cyber access opens more security vulnerabilities for threat actors to exploit By Julia O’Toole, Founder and CEO of MyCena Security Solutions In recent […]

Posted in Cyber Security News | Comments Off on Using Identity for Access Is a Huge Cybersecurity Risk

Understanding The True Financial Risk of Ransomware Attacks

By Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security The European Union Agency for Cybersecurity (ENISA) recently defined today’s threat landscape as the “golden era of ransomware”. Ransomware […]

Posted in Cyber Security News | Comments Off on Understanding The True Financial Risk of Ransomware Attacks

Can Cloud Telephony Services with Military Grade Security Enable Organizations to Create High Brand Value?

By Shubham Patidar, Research Consultant at Fact.MR In today’s technology driven world, the workforce is spread out between those working remotely and those working in offices, with some planning on […]

Posted in Cyber Security News | Comments Off on Can Cloud Telephony Services with Military Grade Security Enable Organizations to Create High Brand Value?

Trust in The Future of Electronic Healthcare Data Management and Security

By Coley Chavez, Chief of Staff and Compliance Officer of Genomic Life Healthcare data is defined as “any information, which relates to the physical or mental health of an individual, […]

Posted in Cyber Security News | Comments Off on Trust in The Future of Electronic Healthcare Data Management and Security

Top Trends in Cyber Security Post-Pandemic

By Suchita Gupta, Associate Content Writer, Allied Market Research Cyber security is a fast-moving sector as both cyber security providers and hackers go toe-to-toe with each other. With new threats, […]

Posted in Cyber Security News | Comments Off on Top Trends in Cyber Security Post-Pandemic

Top 10 Actions to Repel and Recover from Active Directory Attacks

By Sean Deuby, Director of Services, Semperis Active Directory is foundational to on-premises and hybrid identities that are everywhere in enterprise environments and the cloud today. It is also key […]

Posted in Cyber Security News | Comments Off on Top 10 Actions to Repel and Recover from Active Directory Attacks

Threat Modeling: Bridging the Gap Between Developers and Security Architects

By Stephen de Vries, Co-Founder and CEO of IriusRisk The application security world is known for friction between security and development teams. However, this tension can be eradicated through a […]

Posted in Cyber Security News | Comments Off on Threat Modeling: Bridging the Gap Between Developers and Security Architects

A Belt-and-Suspenders Approach To Application Security

By Timothy Liu, CTO and Co-Founder, Hillstone Networks In recent years, the pandemic and other forces have led to drastic changes in the way we work. The distributed workforce has […]

Posted in Cyber Security News | Comments Off on A Belt-and-Suspenders Approach To Application Security

The Implications of Zero Trust for Data

By Julius Schorzman, Director of Product Management, Koverse, Inc., an SAIC Company Zero Trust is a hot topic in network security. For those not familiar, zero trust is the “never […]

Posted in Cyber Security News | Comments Off on The Implications of Zero Trust for Data

Source Code Protection Market

Do we need backup software for DevOps ecosystems? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, the software is the driving force of the world, and developers are […]

Posted in Cyber Security News | Comments Off on Source Code Protection Market

Protecting The Enterprise in The Digital Era

What Organizations Need To Know In The New Workplace By Anurag Lal, President and CEO, NetSfere Over the past two years, the entire globe has experienced a takeoff in the […]

Posted in Cyber Security News | Comments Off on Protecting The Enterprise in The Digital Era

Protecting Government Data at The Intersection of Zero Trust and Open Source

By Rick Vanover, Senior Director, Product Strategy, Veeam As the federal government continues its emergence from the pandemic, its information technology strategy is being influenced by two compelling, but divergent […]

Posted in Cyber Security News | Comments Off on Protecting Government Data at The Intersection of Zero Trust and Open Source

Privacy Enhancing Technology Is Crucial for Cybersecurity When Hybrid Working

Ivar Wiersma of R3 discusses the cybersecurity issues presented by the “new normal” and how these challenges can be overcome. By Ivar Wiersma, Head of Conclave, R3 The practice of […]

Posted in Cyber Security News | Comments Off on Privacy Enhancing Technology Is Crucial for Cybersecurity When Hybrid Working

Patch Zero Days In 15 Minutes Or

Be Breached By Randy Reiter CEO of Don’t Be Breached Patch Zero Day Software Bugs in 15 Minutes Before the Hackers Arrive Domestic and International hacker groups are now targeting […]

Posted in Cyber Security News | Comments Off on Patch Zero Days In 15 Minutes Or

Overcoming Security Hurdles for IOT Projects

By Phil Beecher, CEO and President, Wi-SUN Alliance Five years ago, Wi-SUN Alliance published its first Internet of Things (IoT) ‘state of the nation’ report. At the time, we were […]

Posted in Cyber Security News | Comments Off on Overcoming Security Hurdles for IOT Projects

Low-To-High-Side Development in The Public Sector

Low-to-High-Side Development By Marc Kriz, Strategic Account Leader of National Security Programs, GitLab The stay-at-home orders put in place at the start of the COVID-19 pandemic were a catalyst for […]

Posted in Cyber Security News | Comments Off on Low-To-High-Side Development in The Public Sector

Getting Ahead Of The Latest Threat By Perception Point

By Karen Krivaa, Chief Marketing Officer What is Perception Point? Perception Point was founded in 2015 by three innovators who served in elite cyber units in the Israeli Intelligence Corps. […]

Posted in Cyber Security News | Comments Off on Getting Ahead Of The Latest Threat By Perception Point

Long-Term Impacts A Data Breach Can Have on Your Business

Ways To Protect Your Business from A Data Breach By Grant Gibson, Executive Vice President, CIBR Ready The average data security breach takes less time to pull off than it […]

Posted in Cyber Security News | Comments Off on Long-Term Impacts A Data Breach Can Have on Your Business

It Isn’t Your Daddy’s Oldsmobile Anymore

By Dan Shoemaker, Professor and Distinguished Visitor IEEE There is no situation where you are more vulnerable to a cyber-attack than when you are in your automobile. Are you surprised? […]

Posted in Cyber Security News | Comments Off on It Isn’t Your Daddy’s Oldsmobile Anymore

Is Your Security Log ‘Bathtub’ About to Overflow?

By Ozan Unlu, CEO and Founder, Edge Delta Security Log Data – More Data Doesn’t Always Mean Better Protection A major issue that security operations teams face is the aggressive […]

Posted in Cyber Security News | Comments Off on Is Your Security Log ‘Bathtub’ About to Overflow?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X