Monthly Archives: November 2022
The Role of Endpoint Security and Management In Threat Detection
By Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches originate at the endpoint (servers, desktops, laptops, mobile devices and IoT devices). These […]
Introduction to Remote Spectrum Monitoring
Spectrum Monitoring for Critical Infrastructure By Brandon Malatest, Per Vices Corporation As wireless communications break its expansion banks, the need for robust networks relatively free of interference continues to grow. […]
In Government, Secure Data Drives the Greater Good
By Carolyn Duby, Field CTO and Cybersecurity Lead, Cloudera Government Solutions As a key component of President Biden’s December 2021 Executive Order on citizen experience, government agencies must be committed […]
Going ‘Passwordless’ Is Not a Simple Process and Should Not Be Rushed
Businesses need to scope, plan, and implement with care By Alex Tupman, CEO, Espria Organisations rushing to adopt passwordless authentication are doing so for a variety of reasons: to deliver […]
Four Tips for Health-Care Providers to Stay Cyber Secure
By Aaron Sandeen, CEO and Co-Founder, CSW The number of attacks aimed at the health-care industry has increased significantly during the past few years. Health-care institutions are vulnerable to cyberattacks […]
For Cybercriminals, the Game is On and They’re Playing to Win
Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom Software Our fascination — and for many, obsession — with sports in […]
Cybersecurity Threats Require More Hands-On Investment by US Oil and Gas Companies
By Martin Riley, Director of Managed Security Services, Bridewell The US oil and gas industry is going through an exciting period of change, with a noticeable trend towards integrating new […]
You Can’t Prevent Every Attack, But You Can Mitigate the Damage
More than ever, attackers are leveraging compromised identities to carry out cyberattacks. Stopping them is a challenge—but limiting their impact doesn’t have to be. By Grady Summers, Executive Vice President […]
From Edge to Core: Security in the Data Center
By Timothy Liu, CTO and Co-Founder, Hillstone Networks Most organizations recognize the data center as the most essential and critical element of the network. After all, it serves as the […]
The Role of Compliance in Cybersecurity
Cybersecurity compliance is essential as it contributes to cyberspace safety in meaningful ways By Anas Baig, Product Manager, Securiti Cybersecurity is a complicated yet essential system – one that needs […]
For Cybercriminals, the Game is On and They’re Playing to Win
Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom Software Our fascination — and for many, obsession — with sports in […]
Continuous Exposure Management: Flipping the Script on Cybersecurity
By Brett Kelsey, CEO, Reveald Hackers recently exploited flaws in the Binance blockchain to steal $570 million and vanish into thin air. At any other time, a half-billion-dollar theft would […]
Cybersecurity, Data Management and Insufficient Systems Listed as Top Concerns for Risk Professionals
Diligent is the global leader in modern governance providing SaaS solutions across governance, risk, compliance, audit and ESG Amid global developments from inflation to war, the role risk and compliance […]
Blockchain Security: Can You Trust This Technology?
Is Blockchain Technology Really Secure? By Alexandr Khomich, CEO at Andersen Blockchain is considered one of the most secure technologies for storing and transmitting data. With an average of more […]
The Rise of Crypto Regulations
How to Comply Now, and for the Future By Ben Richmond, CEO and Founder of CUBE Global As cryptocurrency is gradually explored as a mainstream option for payments – with […]
The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022
By Greg Notch, CISO, Expel The list of challenges security professionals face will not let up, as new threats emerge on a weekly—even daily—basis. Security teams need to stay informed […]
Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them
By Tammy Mindel, Security Product Manager at Semperis Microsoft Active Directory (AD) has become a highly lucrative target for cyberattackers. That’s no surprise, given the prevalence of the identity service […]
Blockchain in Retail Will Soon Become a Universal Concept- Explore the Scenario
By Koyel Ghosh, Sr. Specialist Content Writer, Allied Market Research, India In the last few years, there’s been a steep rise in consumer demand for fast, easy, and hassle-free transactions, […]
Why Cybersecurity Is Critical for ESG
Cyber-Awareness Can Help Companies Meet Esg Obligations By Shaun McAlmont, CEO, NINJIO One of the most important trends in the private sector—primarily among publicly traded companies, but increasingly among small […]
The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity
An Outline of the Importance of Proper E-Waste Disposal for Enterprise Best Practices in terms of both CSR and Cybersecurity By Milica Vojnic, Senior Digital Marketing Executive, Wisetek E-waste is […]
Addressing the Unique Obstacles in Healthcare Through Policy-Based Access Control
By Gal Helemski, Co-Founder and CTO, PlainID As the world continues to enter into virtual spaces, the use of identity and access management, or IAM, is ultimately a requirement for […]
The Fight Against Fraud Continues
A closer look at biometric authentication technology By Brett Beranek, Vice-President & General Manager of Security & Biometrics, Nuance Communications As we recognize Cybersecurity Awareness Month, many organizations are taking […]
Web3, Good Hygiene, and the Need for End-to-End Security
By Professor Ronghui Gu, CEO, CertiK Having a smart contract audit is a lot like washing your hands– do it only once, and be prepared for the consequences. As the […]
Zero-Trust Needs to be a Priority – For SaaS, Too
By Misha Seltzer, Co-Founder and CTO of Atmosec Call it a sign of the times; you can’t trust anyone these days, even the most loyal members of your organization. As […]
The Growing Importance of VPNs
By Izzy Murphy, Reporter for TechRound There are many advantages which come from using a VPN, such as being able to bypass geo-blockers, access information or data remotely and above […]
The Future of Attack Surface Management: How to Prepare
By David Monnier, Team Cymru Fellow To stay ahead of threat actors, organizations must monitor their attack surfaces continuously, maintain accurate and updated asset inventories, and judge which vulnerabilities to […]
Organizations Should Break into Their Own Networks
By John Meyer, Arcfield VP, Cyber Products and Services With talent and resources stretched thin, organizations may not have the personnel or bandwidth to uncover where vulnerabilities lie in their […]
WordPress Security Explained – Reduce the Risk of Being Hacked by 82%
In 2022, the WordPress is still #1 fastest growing website platform and the best content management system currently available. Approximately 42% of all websites online are based on WordPress. Fortune […]
The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability
By Neil Ellis, CIO and CISO at CafeX Communications Disparate Solutions Are Costing Your Organization Breaches from the past year have made clear that current approaches to Cyber Incident Management […]
CISA’s Strategic Plan: A Step in the Right Direction
By Gary Barlet, Federal Chief Technology Officer, Illumio The world will spend nearly $170 billion on cybersecurity in 2022, and nearly $20 billion of that will be spent by the […]