Monthly Archives: October 2023

Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry

By Koyal Ghosh, Senior Writer, Allied Market Reasearch Growing trend of BYOD and smart assimilation of machine learning, IoT, and AI in several projects have heightened the need for cyber […]

Posted in Cyber Security News | Comments Off on Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry

4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud Enterprises are adopting public cloud providers like never before. Gartner estimated the global forecasted spend on public cloud services to grow by […]

Posted in Cyber Security News | Comments Off on 4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud

Fend Off the Next Phishing Attack With A “Human Firewall.”

Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the most popular cyberattack, and those companies without proper cybersecurity measures […]

Posted in Cyber Security News | Comments Off on Fend Off the Next Phishing Attack With A “Human Firewall.”

Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World

By Ani Chaudhuri, CEO, Dasera The EU-US Data Privacy Framework is a product of years of painstaking negotiation, a well-intended attempt to tread the tightrope between national security and personal […]

Posted in Cyber Security News | Comments Off on Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […]

Posted in Cyber Security News | Comments Off on 8 Tips for Best Results in Red-Teaming

Why Compliance Matters When Dealing with AI and Finances

By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and use of AI tools such as ChatGPT have spurred greater […]

Posted in Cyber Security News | Comments Off on Why Compliance Matters When Dealing with AI and Finances

Effective Workplace Education is Built Around Incentives

How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform is providing compelling behavioral incentives that keep employees engaged and […]

Posted in Cyber Security News | Comments Off on Effective Workplace Education is Built Around Incentives

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […]

Posted in Cyber Security News | Comments Off on Stronger Together: Attack Surface Management and Security Validation

How Cyber Risk Quantification can Help Align CISOs with the Board.

By Lior Bar-Lev, VP Strategy & BizOps, CYE Recently, the American National Institute for Standards and Technology (NIST) released a draft version 2.0 of its “notorious CSF”—the Cybersecurity Framework. The […]

Posted in Cyber Security News | Comments Off on How Cyber Risk Quantification can Help Align CISOs with the Board.

How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX

By Benjamin Fabre, CEO & Co-founder, DataDome In the world of e-commerce, ensuring the security of online transactions is crucial. While bot management systems play a significant role in safeguarding […]

Posted in Cyber Security News | Comments Off on How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX

When it Comes to ZTNA, Buyer Beware

By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work policies, organizations are turning to the concept of zero trust […]

Posted in Cyber Security News | Comments Off on When it Comes to ZTNA, Buyer Beware

Closing The Gap: Resolving Human Error in Cloud Security

By Patrick Pocalyko, GM North America, CYREBRO Cybersecurity technology is critical to securing the cloud but it’s easy to forget that people also play an important role. And the fact […]

Posted in Cyber Security News | Comments Off on Closing The Gap: Resolving Human Error in Cloud Security

Tech-Forward Strategies to Effectively Fight Fraud

By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but it has also introduced an onslaught of fraudulent attacks on […]

Posted in Cyber Security News | Comments Off on Tech-Forward Strategies to Effectively Fight Fraud

Why You Should Prioritize Your Privacy Policies

By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created a need for commercial websites in the United States to […]

Posted in Cyber Security News | Comments Off on Why You Should Prioritize Your Privacy Policies

Steps for Preparing for a Quantum-Resistant Cryptographic Future

By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature of cryptography in our digital world. Virtually every digital connection […]

Posted in Cyber Security News | Comments Off on Steps for Preparing for a Quantum-Resistant Cryptographic Future

What is Malvertising?

Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed digital marketing. From tracking customer conversations to measuring engagement with […]

Posted in Cyber Security News | Comments Off on What is Malvertising?

Secure Remote Access is Not a One Size Fits All Vision

Unlocking the puzzle of OT security By Kevin Kumpf, Cybersecurity Evangelist at Cyolo Secure Remote Access (SRA) is a term that can be technologically defined in many ways, depending on […]

Posted in Cyber Security News | Comments Off on Secure Remote Access is Not a One Size Fits All Vision

Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities

Growing Cyber Attacks Pose Existential Threats to Business – Can More Connected And Efficient Security Help Organizations Gain The Upper Hand? By Emily L. Phelps, Director & Cybersecurity Advocate, Cyware […]

Posted in Cyber Security News | Comments Off on Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities

ISO Certification is the Key to Better Cybersecurity for Business

By Sami Mäkiniemelä, Chief Security Officer, Miradore Cyberattacks are on the rise. Every month it seems like another major business gets hit, with their data and customers compromised at an […]

Posted in Cyber Security News | Comments Off on ISO Certification is the Key to Better Cybersecurity for Business

From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs

How to create a well-defined incident response plan By David Chernitzky, Co-founder and CEO, Armour Cybersecurity Cybersecurity incidents can result in significant financial losses, damage to reputation, and compromised customer […]

Posted in Cyber Security News | Comments Off on From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs

Six Must-Focus Cybersecurity Areas in Network Sprawl

By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater capacity to accommodate many connected devices hold tremendous potential and […]

Posted in Cyber Security News | Comments Off on Six Must-Focus Cybersecurity Areas in Network Sprawl

Securing Police Communications: Protecting Communities

By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing and the communities they serve. The ability to successfully communicate […]

Posted in Cyber Security News | Comments Off on Securing Police Communications: Protecting Communities

Key Factors and Measures to Address Burnout In The Cybersecurity Field

The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be on the rise, but one of the biggest threats to […]

Posted in Cyber Security News | Comments Off on Key Factors and Measures to Address Burnout In The Cybersecurity Field

Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity

By Avishai Avivi, CISO, SafeBreach The face of cybersecurity is evolving. Cybercrime and its implications have grown into an inescapable fact of our daily lives, affecting everyone from the general […]

Posted in Cyber Security News | Comments Off on Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity

Ensuring Container Security: Safeguarding the Future Of Cloud Computing

Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) In today’s fast-paced digital landscape, containerization […]

Posted in Cyber Security News | Comments Off on Ensuring Container Security: Safeguarding the Future Of Cloud Computing

Passive Optical Networks: A Game Changer for Now And The Future

By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC The Department of Defense (DoD) faces challenges in meeting network […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Passive Optical Networks: A Game Changer for Now And The Future

Will Zero Trust Replace SD-WAN?

By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”. Let’s take a deeper look at both and assess their […]

Posted in Cyber Security News | Comments Off on Will Zero Trust Replace SD-WAN?

MOVEit’s Ransomware Attack Highlights the State of Cybersecurity

By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one leading business application vendor learned the hard way in May. […]

Posted in Cyber Security News | Comments Off on MOVEit’s Ransomware Attack Highlights the State of Cybersecurity

Securing the Cloud

Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is now the norm. Up to 94% of enterprises reportedly use […]

Posted in Cyber Security News | Comments Off on Securing the Cloud

How Hacking of The Internet of Things Works In Practice

By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each other using the internet as a communication channel. As it’s […]

Posted in Cyber Security News | Comments Off on How Hacking of The Internet of Things Works In Practice

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X