Monthly Archives: October 2022
Scared Of Your Own Shadow IT? Addressing The Top Security Concern Around SaaS Adoption
By Uri Haramati, Co-Founder and CEO of Torii The pandemic struck, and organizations were forced to embrace remote work and cloud applications. Software-as-a-Service (SaaS) apps like Zoom and Slack kept […]
Russia’s Invasion of Ukraine Lays Ground for a New Era of Cyberwarfare
Russia is known to be the world’s leading hacking superpower for a reason. The country has an infamous history of executing high impact cyberattacks, often aimed at one of the […]
Raising the Alarm on DDoS Attacks
By Ivan Shefrin, Executive Director for Managed Security Services at Comcast Business Many organizations underappreciate the risk of distributed denial-of-service (DDoS) attacks, which remain a significant threat to the availability […]
How To Protect Against The 83 million Cyber Attacks Detected In 2021
The 4 Basic Cybersecurity Practices Experts Say Prevent Most Attacks By CyberLock Defense, Lockton Affinity It’s a familiar message at CyberLock Defense: multi-factor authentication, threat monitoring, response planning and risk […]
Micro-Segmentation: Where Does It Fit into Zero Trust?
Micro-Segmentation Is Not Zero Trust Alone Or Vice Versa By Brian Haugli – CEO, SideChannel Micro-segmentation is not Zero Trust. It is the technology component to realize a Zero Trust […]
Cybersecurity For Our Nation’s Critical Infrastructure
How you can do your part to protect mission-critical assets and services By Kamil Karmali, Global Commercial Manager, Cybersecurity, Rockwell Automation The Cybersecurity and Infrastructure Security Agency (CISA) describes critical infrastructure as […]
Why Throwing Money at Cybersecurity Doesn’t Work
By Zac Amos, Features Editor, ReHack Cyberattacks have become more frequent and debilitating as the work gets more tech-centric. With so many advanced and expensive security tools available, companies should […]
Why Cyber-Attacks on The Cloud Are Rising and How to Prevent Them
Increase in implementation of cloud by government and private organizations to improve efficiency and save costs made it the prime target for cyber-criminals. However, taking security measures can enable smooth […]
Why CSOs Are Decluttering Their Cybersecurity Toolboxes
By Motti Elloul, VP Customer Success and Incident Response, Perception Point Slashed budgets, staff shortages, and the significant risks associated with legacy cybersecurity solutions – these reasons and more are […]
What We Have Learnt Building a Global Security Conscious Culture
By Nicola McCoy, Chief Information Security Officer at RSM International The growing cyber risk is impacting global businesses of all shapes and sizes as ‘bad actors’ develop more sophisticated and […]
Using Identity for Access Is a Huge Cybersecurity Risk
Why FIDO’s proposal to use identification for cyber access opens more security vulnerabilities for threat actors to exploit By Julia O’Toole, Founder and CEO of MyCena Security Solutions In recent […]
Understanding The True Financial Risk of Ransomware Attacks
By Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security The European Union Agency for Cybersecurity (ENISA) recently defined today’s threat landscape as the “golden era of ransomware”. Ransomware […]
Can Cloud Telephony Services with Military Grade Security Enable Organizations to Create High Brand Value?
By Shubham Patidar, Research Consultant at Fact.MR In today’s technology driven world, the workforce is spread out between those working remotely and those working in offices, with some planning on […]
Trust in The Future of Electronic Healthcare Data Management and Security
By Coley Chavez, Chief of Staff and Compliance Officer of Genomic Life Healthcare data is defined as “any information, which relates to the physical or mental health of an individual, […]
Top Trends in Cyber Security Post-Pandemic
By Suchita Gupta, Associate Content Writer, Allied Market Research Cyber security is a fast-moving sector as both cyber security providers and hackers go toe-to-toe with each other. With new threats, […]
Top 10 Actions to Repel and Recover from Active Directory Attacks
By Sean Deuby, Director of Services, Semperis Active Directory is foundational to on-premises and hybrid identities that are everywhere in enterprise environments and the cloud today. It is also key […]
Threat Modeling: Bridging the Gap Between Developers and Security Architects
By Stephen de Vries, Co-Founder and CEO of IriusRisk The application security world is known for friction between security and development teams. However, this tension can be eradicated through a […]
A Belt-and-Suspenders Approach To Application Security
By Timothy Liu, CTO and Co-Founder, Hillstone Networks In recent years, the pandemic and other forces have led to drastic changes in the way we work. The distributed workforce has […]
The Implications of Zero Trust for Data
By Julius Schorzman, Director of Product Management, Koverse, Inc., an SAIC Company Zero Trust is a hot topic in network security. For those not familiar, zero trust is the “never […]
Source Code Protection Market
Do we need backup software for DevOps ecosystems? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, the software is the driving force of the world, and developers are […]
Protecting The Enterprise in The Digital Era
What Organizations Need To Know In The New Workplace By Anurag Lal, President and CEO, NetSfere Over the past two years, the entire globe has experienced a takeoff in the […]
Protecting Government Data at The Intersection of Zero Trust and Open Source
By Rick Vanover, Senior Director, Product Strategy, Veeam As the federal government continues its emergence from the pandemic, its information technology strategy is being influenced by two compelling, but divergent […]
Privacy Enhancing Technology Is Crucial for Cybersecurity When Hybrid Working
Ivar Wiersma of R3 discusses the cybersecurity issues presented by the “new normal” and how these challenges can be overcome. By Ivar Wiersma, Head of Conclave, R3 The practice of […]
Patch Zero Days In 15 Minutes Or
Be Breached By Randy Reiter CEO of Don’t Be Breached Patch Zero Day Software Bugs in 15 Minutes Before the Hackers Arrive Domestic and International hacker groups are now targeting […]
Overcoming Security Hurdles for IOT Projects
By Phil Beecher, CEO and President, Wi-SUN Alliance Five years ago, Wi-SUN Alliance published its first Internet of Things (IoT) ‘state of the nation’ report. At the time, we were […]
Low-To-High-Side Development in The Public Sector
Low-to-High-Side Development By Marc Kriz, Strategic Account Leader of National Security Programs, GitLab The stay-at-home orders put in place at the start of the COVID-19 pandemic were a catalyst for […]
Getting Ahead Of The Latest Threat By Perception Point
By Karen Krivaa, Chief Marketing Officer What is Perception Point? Perception Point was founded in 2015 by three innovators who served in elite cyber units in the Israeli Intelligence Corps. […]
Long-Term Impacts A Data Breach Can Have on Your Business
Ways To Protect Your Business from A Data Breach By Grant Gibson, Executive Vice President, CIBR Ready The average data security breach takes less time to pull off than it […]
It Isn’t Your Daddy’s Oldsmobile Anymore
By Dan Shoemaker, Professor and Distinguished Visitor IEEE There is no situation where you are more vulnerable to a cyber-attack than when you are in your automobile. Are you surprised? […]
Is Your Security Log ‘Bathtub’ About to Overflow?
By Ozan Unlu, CEO and Founder, Edge Delta Security Log Data – More Data Doesn’t Always Mean Better Protection A major issue that security operations teams face is the aggressive […]