Monthly Archives: November 2022

The Role of Endpoint Security and Management In Threat Detection

By Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches originate at the endpoint (servers, desktops, laptops, mobile devices and IoT devices). These […]

Posted in Cyber Security News, Featured | Comments Off on The Role of Endpoint Security and Management In Threat Detection

Introduction to Remote Spectrum Monitoring

Spectrum Monitoring for Critical Infrastructure By Brandon Malatest, Per Vices Corporation As wireless communications break its expansion banks, the need for robust networks relatively free of interference continues to grow. […]

Posted in Cyber Security News | Comments Off on Introduction to Remote Spectrum Monitoring

In Government, Secure Data Drives the Greater Good

By Carolyn Duby, Field CTO and Cybersecurity Lead, Cloudera Government Solutions As a key component of President Biden’s December 2021 Executive Order on citizen experience, government agencies must be committed […]

Posted in Cyber Security News | Comments Off on In Government, Secure Data Drives the Greater Good

Going ‘Passwordless’ Is Not a Simple Process and Should Not Be Rushed

Businesses need to scope, plan, and implement with care By Alex Tupman, CEO, Espria Organisations rushing to adopt passwordless authentication are doing so for a variety of reasons: to deliver […]

Posted in Cyber Security News | Comments Off on Going ‘Passwordless’ Is Not a Simple Process and Should Not Be Rushed

Four Tips for Health-Care Providers to Stay Cyber Secure

By Aaron Sandeen, CEO and Co-Founder, CSW The number of attacks aimed at the health-care industry has increased significantly during the past few years. Health-care institutions are ‌vulnerable to cyberattacks […]

Posted in Cyber Security News | Comments Off on Four Tips for Health-Care Providers to Stay Cyber Secure

For Cybercriminals, the Game is On and They’re Playing to Win

Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom Software Our fascination — and for many, obsession — with sports in […]

Posted in Cyber Security News | Comments Off on For Cybercriminals, the Game is On and They’re Playing to Win

Cybersecurity Threats Require More Hands-On Investment by US Oil and Gas Companies

By Martin Riley, Director of Managed Security Services, Bridewell The US oil and gas industry is going through an exciting period of change, with a noticeable trend towards integrating new […]

Posted in Cyber Security News | Comments Off on Cybersecurity Threats Require More Hands-On Investment by US Oil and Gas Companies

You Can’t Prevent Every Attack, But You Can Mitigate the Damage

More than ever, attackers are leveraging compromised identities to carry out cyberattacks. Stopping them is a challenge—but limiting their impact doesn’t have to be. By Grady Summers, Executive Vice President […]

Posted in Cyber Security News, Featured | Comments Off on You Can’t Prevent Every Attack, But You Can Mitigate the Damage

From Edge to Core: Security in the Data Center

By Timothy Liu, CTO and Co-Founder, Hillstone Networks Most organizations recognize the data center as the most essential and critical element of the network. After all, it serves as the […]

Posted in Cyber Security News, Featured | Comments Off on From Edge to Core: Security in the Data Center

The Role of Compliance in Cybersecurity

Cybersecurity compliance is essential as it contributes to cyberspace safety in meaningful ways By Anas Baig, Product Manager, Securiti Cybersecurity is a complicated yet essential system – one that needs […]

Posted in Cyber Security News, Featured | Comments Off on The Role of Compliance in Cybersecurity

For Cybercriminals, the Game is On and They’re Playing to Win

Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom Software Our fascination — and for many, obsession — with sports in […]

Posted in Cyber Security News, Featured | Comments Off on For Cybercriminals, the Game is On and They’re Playing to Win

Continuous Exposure Management: Flipping the Script on Cybersecurity

By Brett Kelsey, CEO, Reveald Hackers recently exploited flaws in the Binance blockchain to steal $570 million and vanish into thin air. At any other time, a half-billion-dollar theft would […]

Posted in Cyber Security News | Comments Off on Continuous Exposure Management: Flipping the Script on Cybersecurity

Cybersecurity, Data Management and Insufficient Systems Listed as Top Concerns for Risk Professionals

Diligent is the global leader in modern governance providing SaaS solutions across governance, risk, compliance, audit and ESG Amid global developments from inflation to war, the role risk and compliance […]

Posted in Cyber Security News | Comments Off on Cybersecurity, Data Management and Insufficient Systems Listed as Top Concerns for Risk Professionals

Blockchain Security: Can You Trust This Technology?

Is Blockchain Technology Really Secure? By Alexandr Khomich, CEO at Andersen Blockchain is considered one of the most secure technologies for storing and transmitting data. With an average of more […]

Posted in Cyber Security News | Comments Off on Blockchain Security: Can You Trust This Technology?

The Rise of Crypto Regulations

How to Comply Now, and for the Future By Ben Richmond, CEO and Founder of CUBE Global As cryptocurrency is gradually explored as a mainstream option for payments – with […]

Posted in Cyber Security News, Featured | Comments Off on The Rise of Crypto Regulations

The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022

By Greg Notch, CISO, Expel The list of challenges security professionals face will not let up, as new threats emerge on a weekly—even daily—basis. Security teams need to stay informed […]

Posted in Cyber Security News, Featured | Comments Off on The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022

Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them

By Tammy Mindel, Security Product Manager at Semperis Microsoft Active Directory (AD) has become a highly lucrative target for cyberattackers. That’s no surprise, given the prevalence of the identity service […]

Posted in Cyber Security News, Featured | Comments Off on Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them

Blockchain in Retail Will Soon Become a Universal Concept- Explore the Scenario

By Koyel Ghosh, Sr. Specialist Content Writer, Allied Market Research, India In the last few years, there’s been a steep rise in consumer demand for fast, easy, and hassle-free transactions, […]

Posted in Cyber Security News | Comments Off on Blockchain in Retail Will Soon Become a Universal Concept- Explore the Scenario

Why Cybersecurity Is Critical for ESG

Cyber-Awareness Can Help Companies Meet Esg Obligations By Shaun McAlmont, CEO, NINJIO One of the most important trends in the private sector—primarily among publicly traded companies, but increasingly among small […]

Posted in Cyber Security News, Featured | Comments Off on Why Cybersecurity Is Critical for ESG

The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity

An Outline of the Importance of Proper E-Waste Disposal for Enterprise Best Practices in terms of both CSR and Cybersecurity By Milica Vojnic, Senior Digital Marketing Executive, Wisetek E-waste is […]

Posted in Cyber Security News, Featured | Comments Off on The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity

Addressing the Unique Obstacles in Healthcare Through Policy-Based Access Control

By Gal Helemski, Co-Founder and CTO, PlainID As the world continues to enter into virtual spaces, the use of identity and access management, or IAM, is ultimately a requirement for […]

Posted in Cyber Security News | Comments Off on Addressing the Unique Obstacles in Healthcare Through Policy-Based Access Control

The Fight Against Fraud Continues

A closer look at biometric authentication technology By Brett Beranek, Vice-President & General Manager of Security & Biometrics, Nuance Communications As we recognize Cybersecurity Awareness Month, many organizations are taking […]

Posted in Cyber Security News | Comments Off on The Fight Against Fraud Continues

Web3, Good Hygiene, and the Need for End-to-End Security

By Professor Ronghui Gu, CEO, CertiK Having a smart contract audit is a lot like washing your hands– do it only once, and be prepared for the consequences. As the […]

Posted in Cyber Security News, Featured | Comments Off on Web3, Good Hygiene, and the Need for End-to-End Security

Zero-Trust Needs to be a Priority – For SaaS, Too

By Misha Seltzer, Co-Founder and CTO of Atmosec Call it a sign of the times; you can’t trust anyone these days, even the most loyal members of your organization. As […]

Posted in Cyber Security News, Featured | Comments Off on Zero-Trust Needs to be a Priority – For SaaS, Too

The Growing Importance of VPNs

By Izzy Murphy, Reporter for TechRound There are many advantages which come from using a VPN, such as being able to bypass geo-blockers, access information or data remotely and above […]

Posted in Cyber Security News, Featured | Comments Off on The Growing Importance of VPNs

The Future of Attack Surface Management: How to Prepare

By David Monnier, Team Cymru Fellow To stay ahead of threat actors, organizations must monitor their attack surfaces continuously, maintain accurate and updated asset inventories, and judge which vulnerabilities to […]

Posted in Cyber Security News, Featured | Comments Off on The Future of Attack Surface Management: How to Prepare

Organizations Should Break into Their Own Networks

By John Meyer, Arcfield VP, Cyber Products and Services With talent and resources stretched thin, organizations may not have the personnel or bandwidth to uncover where vulnerabilities lie in their […]

Posted in Cyber Security News | Comments Off on Organizations Should Break into Their Own Networks

WordPress Security Explained – Reduce the Risk of Being Hacked by 82%

In 2022, the WordPress is still #1 fastest growing website platform and the best content management system currently available.  Approximately 42% of all websites online are based on WordPress.  Fortune […]

Posted in Cyber Security News | Comments Off on WordPress Security Explained – Reduce the Risk of Being Hacked by 82%

The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability

By Neil Ellis, CIO and CISO at CafeX Communications Disparate Solutions Are Costing Your Organization Breaches from the past year have made clear that current approaches to Cyber Incident Management […]

Posted in Cyber Security News, Featured | Comments Off on The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability

CISA’s Strategic Plan: A Step in the Right Direction

By Gary Barlet, Federal Chief Technology Officer, Illumio The world will spend nearly $170 billion on cybersecurity in 2022, and nearly $20 billion of that will be spent by the […]

Posted in Cyber Security News | Comments Off on CISA’s Strategic Plan: A Step in the Right Direction

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X