Monthly Archives: March 2023

Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.

By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and the break-neck pace that […]

Posted in Cyber Security News | Comments Off on Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.

As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security

By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing from month to month […]

Posted in Cyber Security News | Comments Off on As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security

Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there

Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert Herjavec, CEO, Cyderes The […]

Posted in Cyber Security News | Comments Off on Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there

Next Generation Cybersecurity for Small to Midsize Businesses

How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk by By Eyal Gruner, […]

Posted in Cyber Security News, Featured | Comments Off on Next Generation Cybersecurity for Small to Midsize Businesses

Eight Tips for CISOs Trying Get Their Board on Board

By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet CISOs frequently find themselves […]

Posted in Cyber Security News | Comments Off on Eight Tips for CISOs Trying Get Their Board on Board

Zero Trust in a DevOps World

By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and applications – all of […]

Posted in Cyber Security News | Comments Off on Zero Trust in a DevOps World

Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”

By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all sizes and industries, but it can be particularly challenging in environments of high […]

Posted in Cyber Security News | Comments Off on Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”

Why You Can’t Have True Zero Trust Without API Security

By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason. Due to organizations’ embrace of digital business models and enablement […]

Posted in Cyber Security News | Comments Off on Why You Can’t Have True Zero Trust Without API Security

Why Tackling Financial Crime Calls for A Privacy-First Approach

By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial crime, banks and other financial institutions need to share data, […]

Posted in Cyber Security News | Comments Off on Why Tackling Financial Crime Calls for A Privacy-First Approach

Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers

By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the world? It’s simple — Data breaches end up in loss […]

Posted in Cyber Security News | Comments Off on Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers

Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future

By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight to secure sensitive data against future cyber-attacks from quantum computers. […]

Posted in Cyber Security News | Comments Off on Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future

Vulnerability Prioritization is Not a One-Size Fits All Approach

By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging technologies are implemented. Security professionals struggle to keep up with […]

Posted in Cyber Security News | Comments Off on Vulnerability Prioritization is Not a One-Size Fits All Approach

Top 5 Questions to Ask When You’re Building a Cloud Security Strategy

By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the cloud, the security of these digital assets has been a […]

Posted in Cyber Security News | Comments Off on Top 5 Questions to Ask When You’re Building a Cloud Security Strategy

There’s no way you’re still using Consumer Messaging Apps for Business

By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they were intended for personal usage. However, because of the legal […]

Posted in Cyber Security News | Comments Off on There’s no way you’re still using Consumer Messaging Apps for Business

Stop Backing Up Ransomware

By James Gorman When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having good backups has been a […]

Posted in Cyber Security News | Comments Off on Stop Backing Up Ransomware

The WAN Under Siege

WAN managers say they’re adopting zero trust security and using multiple infrastructure security vendors in response to the latest threats against the modern wide area network. By Greg Bryan, Senior […]

Posted in Cyber Security News | Comments Off on The WAN Under Siege

“The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.”

By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world and the increase in mobile device use allow for a […]

Posted in Cyber Security News | Comments Off on “The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.”

The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly

By Dr. Eric Cole, Advisor – Theon Technology Since 2018, there has been serious discussion of a new national privacy law promising Americans enhanced data protection, much like the European […]

Posted in Cyber Security News | Comments Off on The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly

The Biggest Cyber Threats For The Financial Industry In 2023

By Ben Herzberg, Chief Scientist of Satori According to external market data, the financial sector was the most attacked in 2022 by DDoS attacks, while the number of all attacks […]

Posted in Cyber Security News | Comments Off on The Biggest Cyber Threats For The Financial Industry In 2023

Solving The AppSec Dilemma Across the Entire SDLC

Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security Journey The software supply chain is under increasing threat. With […]

Posted in Cyber Security News | Comments Off on Solving The AppSec Dilemma Across the Entire SDLC

Sell tickets to Fans, Not to Bots.

By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event only to discover they are […]

Posted in Cyber Security News | Comments Off on Sell tickets to Fans, Not to Bots.

Securing Collaboration at the Speed of Business

By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is key to a productive remote or hybrid work. And Slack […]

Posted in Cyber Security News | Comments Off on Securing Collaboration at the Speed of Business

Product Review of Specops Password Policy

Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a few solutions in the industry […]

Posted in Cyber Security News, Featured | Comments Off on Product Review of Specops Password Policy

Passwordless: Fact Versus Fiction

By Joshua Parsons, Product Marketing Manager, Enzoic With data breaches commonplace and passwords often found to be the root cause, security teams are seeking password alternatives to help enhance their […]

Posted in Cyber Security News | Comments Off on Passwordless: Fact Versus Fiction

Our Nation Needs Comprehensive AI Legislation, And Soon

By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework to lay the groundwork for the future creation and use […]

Posted in Cyber Security News | Comments Off on Our Nation Needs Comprehensive AI Legislation, And Soon

Lessons From the Uber Hack

By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor authentication (2FA) has always been pointed out as the […]

Posted in Cyber Security News | Comments Off on Lessons From the Uber Hack

Industry Experts Share Their Security Predictions for 2023

Insights on the trends all businesses need to look out for By Multiple Authors It’s no surprise that security is a major topic of conversation, with cyberattacks of all kinds […]

Posted in Cyber Security News | Comments Off on Industry Experts Share Their Security Predictions for 2023

How Zero Trust Enables More Effective Security Management

Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The Open Group There’s a huge buzz around Zero Trust in […]

Posted in Cyber Security News | Comments Off on How Zero Trust Enables More Effective Security Management

How to Stay GDPR Compliant While Sending Cold Emails

Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important marketing technique for any business that depends on reaching new, […]

Posted in Cyber Security News | Comments Off on How to Stay GDPR Compliant While Sending Cold Emails

Has Adoption of ‘Connected Devices’ Outpaced Security?

By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of connected devices but the speed at which these devices have […]

Posted in Cyber Security News | Comments Off on Has Adoption of ‘Connected Devices’ Outpaced Security?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X