Monthly Archives: May 2023
Reduce Healthcare Insider Threats with Identity and Access Management
By Zac Amos, Features Editor of ReHack Identity and access management (IAM) refers to the policies, procedures and technologies used to manage and control access to digital resources and systems. […]
Ransomware Takes No Prisoners
By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military aircraft providing aid to victims of the Turkish-Syrian earthquake, is […]
Protecting Accounting Firms from Cyberattacks
Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS Software Group Financial service firms are a top target for […]
Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World
By Sitaram Iyer, Senior Director of Cloud Native Solutions at Venafi Financial services may be an industry in which mainframes still do much of the heavy lifting, but increasingly it’s […]
Leadership Is Still Washing Their Hands of Cyber Risk
By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has moved in and out of the spotlight like character actors […]
New Cyber Threats Calls for New Approaches
By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23 percent from 2017. In the last two years alone, 66 […]
How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry
By Pete Sorensen, VP of Strategic Initiatives of ConnectWise In the rapidly evolving digital landscape, technology solution providers (TSPs) are having to deal with an unprecedented number of staff vacancies […]
How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?
By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights In today’s geostrategic context, geopolitics and technology are inextricably linked, but many IT professionals who prioritize digital transformation pay comparably […]
Is Your Firm Ready for the SEC?
How To Prepare for the Regulations of Tomorrow By Jason Elmer, Founder and President of Drawbridge It is no secret that cybersecurity regulations are on the rise: in 2022, the […]
Stop Backing Up Ransomware
By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having […]
The Data Challenge: How to Map Data in A Distributed World
By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where all your sensitive data is? As businesses of all sizes […]
Understanding The Concept of Privacy By Design
By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and Privacy Commissioner Ann Cavoukian, is a comprehensive approach to privacy […]
Cyber Attack as an Asymmetric Threat
By Milica D. Djekic, Independent Researcher Abstract: Cyberspace is yet unsafe environment for communication and data transfer. Hacker’s organizations can target many servers, datacenters and endpoints relying on capacities of […]
Cyberattacks on City and Municipal Governments
Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago. The increase in breaches is likely due to several factors, including the […]
HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation
By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in the garage during inclement weather and roll it out on […]
The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.
The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan Kotze, Chief Executive Officer at Encore When someone breaks into […]
SIEM for SAP – Log Evaluation to Attack Detection
By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP. While many organizations have spent the past few years protecting […]
SAP Debugger’s Power and Danger
By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol (“SAP”) representative explained a recently […]
Collaboration is Key to Building Industrial Cyber Resilience
By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis Specialist at the World Economic Forum`s Centre for Cybersecurity Industries […]
Blockchain Startups Are Drawing Substantial Venture Capital Funding
By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various benefits businesses get from it- supply chain management, decentralized finance, […]
Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals
By Brian Sathianathan, Co-Founder and CTO of Iterate.ai As our world becomes more and more digitized, the threat of cyber-attacks has become increasingly prevalent. The need for strong cybersecurity measures […]
A CEO’s Guide to Not Becoming the Next Cyberattack Headline
By Sheetal Pansare, President & Global CEO of Futurism Technologies Imagine you are a CEO waking up to a Class-action lawsuit simply because your IT department failed to comply with […]
2023 Predictions
By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and nearly two-thirds of organizations experienced more than one breach. As […]
Strengths and Vulnerabilities of AI Applications to Health Care
By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant advancements in the healthcare sector, and its potential is almost […]
ChatGPT and You
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. […]
Mastering Patch Management: 10 Essential Best Practices for Optimal Security
What is patch management and why is it important? Software development is a continuous process, whether it involves creating a Windows Server or a simple text editor. Vendors release functional […]
How To Survive a Ransomware Attack and Fix Ransomware Breach Face
By Derek Nugent, Vice President of Revenue at Difenda Ransomware attacks have become a growing concern for businesses and individuals alike. Each year there are over 236.1 million ransomware attacks […]
Going into the Darknet: How Cynet Lighthouse Services Keep Cybersecurity Teams One Step Ahead of Hackers
By monitoring the darknet, as well as underground forums, Cynet is able to identify and prepare for the latest cybersecurity threats before they reach deafening levels. By Eyal Gruner, Co-Founder […]
Security Tool Integration Isn’t Enough Anymore
By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and technologies. In the past, best-of-breed security technology meant having the […]
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence at Cyble Cybercriminal motivations rarely change over time. A typical cyberattack is carried out for one of the following reasons – Illicit […]