Monthly Archives: January 2023

Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming

What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at some point, you received an intriguing email with a subject […]

Posted in Cyber Security News | Comments Off on Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming

Secure APIs to Drive Digital Business

By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming interfaces (APIs) are driving the Internet and our economy. A […]

Posted in Cyber Security News | Comments Off on Secure APIs to Drive Digital Business

Moola Market Manipulation

Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered […]

Posted in Cyber Security News | Comments Off on Moola Market Manipulation

Managing Cybersecurity for Critical National Infrastructure

General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality of managing a cybersecurity program […]

Posted in Cyber Security News | Comments Off on Managing Cybersecurity for Critical National Infrastructure

Remote Workers Face Growing Threats from Phishing Attacks

Analysis Shows Phishing Strikes Up 61% Over 2021,  With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies have reorganized the workplace forever, […]

Posted in Cyber Security News | Comments Off on Remote Workers Face Growing Threats from Phishing Attacks

Infrastructure-as-Code Security: a Critical Responsibility

By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been established for over half a […]

Posted in Cyber Security News | Comments Off on Infrastructure-as-Code Security: a Critical Responsibility

Mobile App APIs Are Crucial to Businesses – But Are Under-Protected

The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources Being Allocated to Runtime App and Data Protection. By David […]

Posted in Cyber Security News, Featured | Comments Off on Mobile App APIs Are Crucial to Businesses – But Are Under-Protected

How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce

By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a rainy day. But as breaches become commonplace, insurers are running […]

Posted in Cyber Security News, Featured | Comments Off on How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce

How Does a Botnet Attack Work?

By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity analysts must consider botnet attacks among classic ransomware and […]

Posted in Cyber Security News | Comments Off on How Does a Botnet Attack Work?

How 5G Networks Are Secured and Enabled By SASE

By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment and security considerations. While still […]

Posted in Cyber Security News | Comments Off on How 5G Networks Are Secured and Enabled By SASE

The Rise in Cyber-Attacks from Bad International Actors

There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By Scott Bledsoe, CEO, Theon Technology […]

Posted in Cyber Security News | Comments Off on The Rise in Cyber-Attacks from Bad International Actors

Five Ways to Keep Endpoint Protection Simple

By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve. In fact, research shows that 68% of organizations have experienced […]

Posted in Cyber Security News | Comments Off on Five Ways to Keep Endpoint Protection Simple

Doenerium: When Stealing from Thieves Is Also a Crime

By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat experts uncovered a particularly worrying and sophisticated phishing attack that […]

Posted in Cyber Security News | Comments Off on Doenerium: When Stealing from Thieves Is Also a Crime

DevSecOps and Digital Transformation: Bridging the Security Gap

How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […]

Posted in Cyber Security News | Comments Off on DevSecOps and Digital Transformation: Bridging the Security Gap

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture

By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face increasing cyberattack threats. Instead of fearing the unknown, business owners […]

Posted in Cyber Security News, Featured | Comments Off on As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture

Why Defensive Superiority Should Rein Over Offensive Capability

By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations and institutions in both the private and public sectors must […]

Posted in Cyber Security News, Featured | Comments Off on Why Defensive Superiority Should Rein Over Offensive Capability

Compliance Is the Key to Unlocking Government Contractor Success

By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order 14028 into law, establishing new security standards for software that the government […]

Posted in Cyber Security News, Featured | Comments Off on Compliance Is the Key to Unlocking Government Contractor Success

Applying the NIST Framework to Ransomware Risk Management

Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP and Chief Architect, Semperis Your organization likely adheres to at least some […]

Posted in Cyber Security News, Featured | Comments Off on Applying the NIST Framework to Ransomware Risk Management

Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?

By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, your home is under attack, 24 hours a day. By the time […]

Posted in Cyber Security News | Comments Off on Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?

Cyber Threats Driving Insurance Claims Activity

By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz Global Corporate & Specialty (AGCS) Cyber Threats Driving Insurance Claims Activity  In […]

Posted in Cyber Security News | Comments Off on Cyber Threats Driving Insurance Claims Activity

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention

By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from how it is viewed today. As enterprise companies started taking on the […]

Posted in Cyber Security News | Comments Off on Common Vulnerabilities of Enterprise Web Security That Demands Your Attention

Automated Patch Management Can Protect Your Business from A Data Disaster

By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can see. For example, the aviation industry prohibits guns or knives on planes […]

Posted in Cyber Security News | Comments Off on Automated Patch Management Can Protect Your Business from A Data Disaster

AI Is the Answer To Modern Cybersecurity Threats

Why embracing AI solutions is key to combatting evolving cyber threats across many sectors. By Ralph Chammah, CEO, OwlGaze With cyber threats becoming increasingly diverse in how they strategically cripple […]

Posted in Cyber Security News | Comments Off on AI Is the Answer To Modern Cybersecurity Threats

What is a mobile possession factor – and how can it replace passwords to stop phishing?

By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – which means we are all vulnerable to phishing attacks. The frequency and […]

Posted in Cyber Security News, Featured | Comments Off on What is a mobile possession factor – and how can it replace passwords to stop phishing?

5 Ways to Protect Your Workplace from Cybersecurity Threats

By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and hackers to exploit data security flaws. […]

Posted in Cyber Security News | Comments Off on 5 Ways to Protect Your Workplace from Cybersecurity Threats

Data, Privacy, And the Future of Artificial Intelligence

By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become both central and increasingly restrictive for businesses in the United States and […]

Posted in Cyber Security News | Comments Off on Data, Privacy, And the Future of Artificial Intelligence

Zero Trust is More Than a Buzzword

Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO and Imperva Fellow, Imperva A bank wouldn’t implicitly trust any individual who […]

Posted in Cyber Security News | Comments Off on Zero Trust is More Than a Buzzword

Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It

By Nick Merritt, Vice President of Security Products and Services, Halo Security Business leaders are confronted with headlines every day that detail how sophisticated hackers have become. Their methods are […]

Posted in Cyber Security News | Comments Off on Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X