Monthly Archives: May 2023

Reduce Healthcare Insider Threats with Identity and Access Management

By Zac Amos, Features Editor of ReHack Identity and access management (IAM) refers to the policies, procedures and technologies used to manage and control access to digital resources and systems. […]

Posted in Cyber Security News | Comments Off on Reduce Healthcare Insider Threats with Identity and Access Management

Ransomware Takes No Prisoners

By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military aircraft providing aid to victims of the Turkish-Syrian earthquake, is […]

Posted in Cyber Security News | Comments Off on Ransomware Takes No Prisoners

Protecting Accounting Firms from Cyberattacks

Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS Software Group Financial service firms are a top target for […]

Posted in Cyber Security News | Comments Off on Protecting Accounting Firms from Cyberattacks

Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World

By Sitaram Iyer, Senior Director of Cloud Native Solutions at Venafi Financial services may be an industry in which mainframes still do much of the heavy lifting, but increasingly it’s […]

Posted in Cyber Security News | Comments Off on Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World

Leadership Is Still Washing Their Hands of Cyber Risk

By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has moved in and out of the spotlight like character actors […]

Posted in Cyber Security News | Comments Off on Leadership Is Still Washing Their Hands of Cyber Risk

New Cyber Threats Calls for New Approaches

By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23 percent from 2017. In the last two years alone, 66 […]

Posted in Cyber Security News | Comments Off on New Cyber Threats Calls for New Approaches

How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry

By Pete Sorensen, VP of Strategic Initiatives of ConnectWise In the rapidly evolving digital landscape, technology solution providers (TSPs) are having to deal with an unprecedented number of staff vacancies […]

Posted in Cyber Security News | Comments Off on How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry

How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?

By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights In today’s geostrategic context, geopolitics and technology are inextricably linked, but many IT professionals who prioritize digital transformation pay comparably […]

Posted in Cyber Security News | Comments Off on How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?

Is Your Firm Ready for the SEC?

How To Prepare for the Regulations of Tomorrow By Jason Elmer, Founder and President of Drawbridge It is no secret that cybersecurity regulations are on the rise: in 2022, the […]

Posted in Cyber Security News | Comments Off on Is Your Firm Ready for the SEC?

Stop Backing Up Ransomware

By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having […]

Posted in Cyber Security News | Comments Off on Stop Backing Up Ransomware

The Data Challenge: How to Map Data in A Distributed World

By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where all your sensitive data is? As businesses of all sizes […]

Posted in Cyber Security News | Comments Off on The Data Challenge: How to Map Data in A Distributed World

Understanding The Concept of Privacy By Design

By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and Privacy Commissioner Ann Cavoukian, is a comprehensive approach to privacy […]

Posted in Cyber Security News | Comments Off on Understanding The Concept of Privacy By Design

Cyber Attack as an Asymmetric Threat

By Milica D. Djekic, Independent Researcher Abstract: Cyberspace is yet unsafe environment for communication and data transfer. Hacker’s organizations can target many servers, datacenters and endpoints relying on capacities of […]

Posted in Cyber Security News | Comments Off on Cyber Attack as an Asymmetric Threat

Cyberattacks on City and Municipal Governments

Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago.  The increase in breaches is likely due to several factors, including the […]

Posted in Cyber Security News, Featured | Comments Off on Cyberattacks on City and Municipal Governments

HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation

By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in the garage during inclement weather and roll it out on […]

Posted in Cyber Security News | Comments Off on HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation

The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.

The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan Kotze, Chief Executive Officer at Encore When someone breaks into […]

Posted in Cyber Security News | Comments Off on The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.

SIEM for SAP – Log Evaluation to Attack Detection

By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP. While many organizations have spent the past few years protecting […]

Posted in Cyber Security News | Comments Off on SIEM for SAP – Log Evaluation to Attack Detection

SAP Debugger’s Power and Danger

By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol (“SAP”) representative explained a recently […]

Posted in Cyber Security News | Comments Off on SAP Debugger’s Power and Danger

Collaboration is Key to Building Industrial Cyber Resilience

By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis Specialist at the World Economic Forum`s Centre for Cybersecurity Industries […]

Posted in Cyber Security News | Comments Off on Collaboration is Key to Building Industrial Cyber Resilience

Blockchain Startups Are Drawing Substantial Venture Capital Funding

By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various benefits businesses get from it- supply chain management, decentralized finance, […]

Posted in Cyber Security News | Comments Off on Blockchain Startups Are Drawing Substantial Venture Capital Funding

Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals

By Brian Sathianathan, Co-Founder and CTO of Iterate.ai As our world becomes more and more digitized, the threat of cyber-attacks has become increasingly prevalent. The need for strong cybersecurity measures […]

Posted in Cyber Security News | Comments Off on Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals

A CEO’s Guide to Not Becoming the Next Cyberattack Headline

By Sheetal Pansare, President & Global CEO of Futurism Technologies Imagine you are a CEO waking up to a Class-action lawsuit simply because your IT department failed to comply with […]

Posted in Cyber Security News | Comments Off on A CEO’s Guide to Not Becoming the Next Cyberattack Headline

2023 Predictions

By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and nearly two-thirds of organizations experienced more than one breach. As […]

Posted in Cyber Security News | Comments Off on 2023 Predictions

Strengths and Vulnerabilities of AI Applications to Health Care

By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant advancements in the healthcare sector, and its potential is almost […]

Posted in Cyber Security News | Comments Off on Strengths and Vulnerabilities of AI Applications to Health Care

ChatGPT and You

Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. […]

Posted in Cyber Security News | Comments Off on ChatGPT and You

Mastering Patch Management: 10 Essential Best Practices for Optimal Security

What is patch management and why is it important? Software development is a continuous process, whether it involves creating a Windows Server or a simple text editor. Vendors release functional […]

Posted in Cyber Security News | Comments Off on Mastering Patch Management: 10 Essential Best Practices for Optimal Security

How To Survive a Ransomware Attack and Fix Ransomware Breach Face

By Derek Nugent, Vice President of Revenue at Difenda Ransomware attacks have become a growing concern for businesses and individuals alike. Each year there are over 236.1 million ransomware attacks […]

Posted in Cyber Security News | Comments Off on How To Survive a Ransomware Attack and Fix Ransomware Breach Face

Going into the Darknet: How Cynet Lighthouse Services Keep Cybersecurity Teams One Step Ahead of Hackers

By monitoring the darknet, as well as underground forums, Cynet is able to identify and prepare for the latest cybersecurity threats before they reach deafening levels. By Eyal Gruner, Co-Founder […]

Posted in Cyber Security News | Comments Off on Going into the Darknet: How Cynet Lighthouse Services Keep Cybersecurity Teams One Step Ahead of Hackers

Security Tool Integration Isn’t Enough Anymore

By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and technologies. In the past, best-of-breed security technology meant having the […]

Posted in Cyber Security News | Comments Off on Security Tool Integration Isn’t Enough Anymore

Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework

By Kaustubh Medhe, Head of Research and Intelligence at Cyble Cybercriminal motivations rarely change over time. A typical cyberattack is carried out for one of the following reasons – Illicit […]

Posted in Cyber Security News | Comments Off on Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X