Monthly Archives: August 2023

Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model

Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyberattacks. Our Arctic Wolf Security Operations Cloud ingests and […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model

Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud

Normalyze is a pioneering provider of data-first cloud security solutions that help global enterprises secure their data wherever it is stored and prevent data breaches. The Normalyze platform uses patented, […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud

Publisher’s Spotlight: Cycode: Secure Code to Cloud – Application Security Posture Management (ASPM) at Scale

Cycode’s modern approach to application security enables organizations to effectively secure their cloud-native applications with cost-efficient use of tooling and staff across the SDLC. The Cycode platform makes AppSec tools better […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Publisher’s Spotlight: Cycode: Secure Code to Cloud – Application Security Posture Management (ASPM) at Scale

Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […]

Posted in Cyber Security News | Tagged , , | Comments Off on Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

The Shodan as The Scariest Search Engine of Today

By Milica D. Djekic According to many media’s releases – the Shodan is characterized as the scariest searching tool of this modern time. The fact is such a search engine […]

Posted in Cyber Security News | Comments Off on The Shodan as The Scariest Search Engine of Today

The Other Russian War – What Can We Do?

Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine, and Russian hackers are attacking the United States. In October, […]

Posted in Cyber Security News | Comments Off on The Other Russian War – What Can We Do?

Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter

Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter

The Industrial Control Systems and The Internet of Things

By Milica D. Djekic The industrial control systems (ICS) are usually the part of critical infrastructure to every country or nation. These systems have passed through information era and today […]

Posted in Cyber Security News | Comments Off on The Industrial Control Systems and The Internet of Things

The Billion Dollar Problem: Securing Business Communication in the Financial Sector

By Anurag Lal, President and CEO of NetSfere Securing business communication in the financial services industry is now more than ever a bottom-line issue. That’s because unsecure business communication creates […]

Posted in Cyber Security News | Comments Off on The Billion Dollar Problem: Securing Business Communication in the Financial Sector

A Cloud Security Conundrum: Protecting Your Company from Third-Party Software Supply Chain Gaps

By Vrinda Khurjekar, Senior Director, AMER business, Searce The sky is the limit for cloud migration as Gartner predicts that worldwide end-user spending on public cloud services is forecast to […]

Posted in Cyber Security News | Comments Off on A Cloud Security Conundrum: Protecting Your Company from Third-Party Software Supply Chain Gaps

Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident Response

Cloud and SaaS have become the new nexus for today’s cyber attackers.  Are you ready to respond to a breach?  Enter Mitiga: Mitiga is the creator of the world’s first […]

Posted in Cyber Security News, Featured | Tagged | Comments Off on Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident Response

Publisher’s Spotlight: Cigent: Make Your Data Invisible

Cigent Technologies is a data security company that is renowned for their data protection  capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Cigent: Make Your Data Invisible

SaaS Application Security: Why It Matters and How to Get It Right

Protecting Emerging Startups from Advanced Cyber Threats with Proactive Security Measures By Babar Khan Akhunzada, Founder, SecurityWall Startups are known for their agility, speed, and innovation. They often disrupt entire […]

Posted in Cyber Security News | Comments Off on SaaS Application Security: Why It Matters and How to Get It Right

Our Risk Perception Is Broken How Do We Fix It?

By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the concept of cyber security in 2000.  Back then, the Dallas […]

Posted in Cyber Security News | Comments Off on Our Risk Perception Is Broken How Do We Fix It?

Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a runtime solution that is proactive, effective, and frictionless. Oligo found […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO of Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as […]

Posted in Cyber Security News | Comments Off on Protecting Sensitive Information Within Translation

An Interview with Dasha Deckwerth – Stealth ISS Group

Posted in Cyber Security News | Comments Off on An Interview with Dasha Deckwerth – Stealth ISS Group

Penetration Testing- Shielding the Web Content Against Hacking

Penetration Testing Market size worth over $5.5 Bn by 2031 By Aashi Mishra, Sr. Content Writer, Research Nester In January 2023, a news surfaced the internet that 235 million twitter […]

Posted in Cyber Security News | Comments Off on Penetration Testing- Shielding the Web Content Against Hacking

Out from the Shadows: SOC Teams Take Their Seat with the “Superheroes”

By Karthik Kannan, Founder and CEO, Anvilogic Watch any superhero movie and it follows the same playbook: the story revolves around the superhero, at the midpoint of the movie there […]

Posted in Cyber Security News | Comments Off on Out from the Shadows: SOC Teams Take Their Seat with the “Superheroes”

Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas

Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas

OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment

By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity regulations and policies, and it’s not just information technology (IT) […]

Posted in Cyber Security News | Comments Off on OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment

Network Architecture Mapping Improves Security Posture and Saves Big Bucks

By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network, including the infrastructure and critical data assets, continues to plague […]

Posted in Cyber Security News | Comments Off on Network Architecture Mapping Improves Security Posture and Saves Big Bucks

Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure

Posted in Cyber Security News | Comments Off on Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure

Measuring the Effectivity of Security with Data Analysis

By Howie Robleza, Freelance Writer, Avigilon Effective security strategies are fundamental to the success of any business with both physical and cyber security of equal importance. Businesses, even with the […]

Posted in Cyber Security News | Comments Off on Measuring the Effectivity of Security with Data Analysis

Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers

Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the affected vendors by financially rewarding researchers. At the time, there […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers

Hybrid Mesh Firewall Management

By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid workforces and cloud networks, there is growing demand to secure […]

Posted in Cyber Security News | Comments Off on Hybrid Mesh Firewall Management

Implement Machine Learning to Secure Your IoT Network

By Zac Amos, Features Editor, ReHack Connected devices pose unique security risks and are prone to bot attacks, requiring a tool capable of quickly processing a large amount of information. […]

Posted in Cyber Security News | Comments Off on Implement Machine Learning to Secure Your IoT Network

How We Grew Revenue by Strengthening Cybersecurity

Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about all industries, increasingly concerned about cybersecurity—and for good reason. A […]

Posted in Cyber Security News | Comments Off on How We Grew Revenue by Strengthening Cybersecurity

Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)?  According to Gartner, by 2025, over 75 percent of organizations will […]

Posted in Cyber Security News, Featured | Comments Off on Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

From Passwords to Passkeys – A Passing of the Torch

The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those without a password manager to keep track, that’s a prompt […]

Posted in Cyber Security News | Comments Off on From Passwords to Passkeys – A Passing of the Torch

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X