Monthly Archives: July 2023

7 Benefits of Implementing ZTNA

(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in the current climate is the potential for an internal security […]

Posted in Cyber Security News | Comments Off on 7 Benefits of Implementing ZTNA

The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape

By Pedro Barata, Chief Product Officer, Feedzai Fraud has plagued the financial services sector for years. In today’s rapidly evolving digital landscape, financial institutions are under increasing pressure to safeguard […]

Posted in Cyber Security News | Comments Off on The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape

Why Inadequate Investment in Cybersecurity is a False Economy

By Luke Dash, CEO, ISMS.online Already suffering the most cyberattacks than any other European country [RH1], the UK looks set to experience a proliferation of vulnerabilities as businesses struggle to […]

Posted in Cyber Security News | Comments Off on Why Inadequate Investment in Cybersecurity is a False Economy

A Look into The Future: My Journey at the 2023 RSA Conference and The Exciting, Yet Troubling Path of Cybersecurity Innovation

Exploring the Future of Cybersecurity at the 2023 RSA Conference By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine As the recipient of Cyber Defense Magazine’s 2023 Young Women in […]

Posted in Cyber Security News | Comments Off on A Look into The Future: My Journey at the 2023 RSA Conference and The Exciting, Yet Troubling Path of Cybersecurity Innovation

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023

By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within an organization’s environment, is a major threat plaguing Security Operations […]

Posted in Cyber Security News | Comments Off on Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?

By Carolyn Crandall, Chief Security Advocate, Cymulate Each year, Cymulate releases a Cybersecurity Effectiveness Report that summarizes and analyzes the findings from customers’ security assessments throughout the year. Unlike other […]

Posted in Cyber Security News | Comments Off on What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?

The Next Evolution of Devsecops For The Defense Department

By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the Department of Defense (DOD) for 2024, emphasizing the Administration’s commitment […]

Posted in Cyber Security News | Comments Off on The Next Evolution of Devsecops For The Defense Department

The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense

By Raj Gopalakrishna, Co-Founder and Chief Product Architect, Acalvio Technologies The use of stolen credentials and resulting identity compromises have become a top attack trajectory. In the past year, 84% […]

Posted in Cyber Security News | Comments Off on The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense

An Interview with Sarah Armstrong-Smith

By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is regularly booked for corporate conference and as a Cyber Security […]

Posted in Cyber Security News | Comments Off on An Interview with Sarah Armstrong-Smith

Why Should Everyone in Your Workplace Know About Cybersecurity?

The Importance Of Strengthening Your Organization’s Human Firewall By Involving All Business Levels And Functional Areas. By Sara Velásquez, Growth Lead, Seccuri What exactly is cybersecurity? Is it a matter […]

Posted in Cyber Security News | Comments Off on Why Should Everyone in Your Workplace Know About Cybersecurity?

Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks

By Sami Mäkiniemelä, Chief Security Officer, Miradore Last year, the U.S. saw a 57% increase in the number of cyberattacks — that’s nearly double the 38% increase that was reported […]

Posted in Cyber Security News | Comments Off on Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks

Securing Communications for Operational Military Success

By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to expertly planned operational communications, military duties can be carried out […]

Posted in Cyber Security News | Comments Off on Securing Communications for Operational Military Success

Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach

By Lorenzo Asuni, CMO, Ermes Cyber Security The Phishing phenomenon is growing exponentially, and unlike the most common forms of scam, it is much more dangerous, because it is more […]

Posted in Cyber Security News | Comments Off on Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach

Operationalizing Zero Trust Architecture

By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust architecture (ZTA) as a means for IT leaders to take a […]

Posted in Cyber Security News | Comments Off on Operationalizing Zero Trust Architecture

Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!

By Craig Burland, CISO, Inversion6 The Cloud’s booming voice, stunning light show and smoke fill the room.  “Faster! More agile! Cheaper! Business aligned! Strategic! I have the answer to all […]

Posted in Cyber Security News | Comments Off on Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!

How Professional Human Hackers Choose Their Targets

By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security awareness training to combat the growing threat from social engineering. […]

Posted in Cyber Security News | Comments Off on How Professional Human Hackers Choose Their Targets

How Should CMMC Impact Your Remote Work Policies?

By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors can add to their toolkits to work for the Department […]

Posted in Cyber Security News | Comments Off on How Should CMMC Impact Your Remote Work Policies?

Hacks And Data Leaks

How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from cyberattacks Hardly a week goes by without a hack or […]

Posted in Cyber Security News | Comments Off on Hacks And Data Leaks

How Sandboxes Protect Organizations from Malware — Known And Unknown

From Detecting Threats to Collecting Rich Signature Data — Sandboxes Help Malware Researchers Keep Defense Systems In Sync With An Evolving Threat Landscape. By Jack Zalesskiy, Technology Writer, ANY.RUN Over […]

Posted in Cyber Security News | Comments Off on How Sandboxes Protect Organizations from Malware — Known And Unknown

What are NIST Encryption Standards? Why Do They Matter a Lot?

By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker assaults and data breaches, as an estimated 30,000 websites are […]

Posted in Cyber Security News | Comments Off on What are NIST Encryption Standards? Why Do They Matter a Lot?

An Interview with Greg Van Der Gaast

By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the Top Trending Ethical Hackers list, Greg van der Gaast has […]

Posted in Cyber Security News | Comments Off on An Interview with Greg Van Der Gaast

Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them

By Marc Laliberte, Director of Security Operations at WatchGuard Over the last decade, many organizations have rapidly accelerated their digital transformation. The rise in cloud hosted Software-as-a-Service (SaaS) applications, continued […]

Posted in Cyber Security News | Comments Off on Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them

Empowered Encryption

Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change represents is more meaningful than the change itself. Case in […]

Posted in Cyber Security News | Comments Off on Empowered Encryption

Online Privacy Statistics

By Milos Djordjevic, Online Privacy Expert, VPN Central Online privacy is a burning issue in our modern threat landscape. It concerns both companies and individuals — no one can afford […]

Posted in Cyber Security News | Comments Off on Online Privacy Statistics

Investing Wisely

Where to focus spend during the economic downturn By Tim Wallen, Regional Director, UK, US & Emerging Markets, Logpoint There remains a great deal of uncertainty when it comes to […]

Posted in Cyber Security News | Comments Off on Investing Wisely

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […]

Posted in Cyber Security News | Comments Off on From AI-driven Defense to Dark Web Threat Intelligence

Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats

By Jennifer Varner, Director Security Solutions Sales – North America, Verizon Business Every year, emerging technologies come to market, offering new opportunities to connect with employees and customers in previously […]

Posted in Cyber Security News | Comments Off on Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats

Healthcare Under Siege

The Critical Threat of Cloud and IoMT Vulnerabilities By Ty Greenhalgh, Industry Principal, Healthcare, Claroty The healthcare sector is grappling with a perfect storm of challenges: economic uncertainty, staff shortages, […]

Posted in Cyber Security News | Comments Off on Healthcare Under Siege

Data Privacy and Data Protection: What Enterprises Need to Know

By Anurag Lal, President and CEO of NetSfere Digital transformation is exponentially increasing the amount of data companies collect, use and store. In fact, it is projected that the total […]

Posted in Cyber Security News | Comments Off on Data Privacy and Data Protection: What Enterprises Need to Know

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO, Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as financial […]

Posted in Cyber Security News | Comments Off on Protecting Sensitive Information Within Translation

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X