Monthly Archives: October 2023
Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry
By Koyal Ghosh, Senior Writer, Allied Market Reasearch Growing trend of BYOD and smart assimilation of machine learning, IoT, and AI in several projects have heightened the need for cyber […]
4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud Enterprises are adopting public cloud providers like never before. Gartner estimated the global forecasted spend on public cloud services to grow by […]
Fend Off the Next Phishing Attack With A “Human Firewall.”
Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the most popular cyberattack, and those companies without proper cybersecurity measures […]
Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World
By Ani Chaudhuri, CEO, Dasera The EU-US Data Privacy Framework is a product of years of painstaking negotiation, a well-intended attempt to tread the tightrope between national security and personal […]
8 Tips for Best Results in Red-Teaming
By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […]
Why Compliance Matters When Dealing with AI and Finances
By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and use of AI tools such as ChatGPT have spurred greater […]
Effective Workplace Education is Built Around Incentives
How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform is providing compelling behavioral incentives that keep employees engaged and […]
Stronger Together: Attack Surface Management and Security Validation
By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […]
How Cyber Risk Quantification can Help Align CISOs with the Board.
By Lior Bar-Lev, VP Strategy & BizOps, CYE Recently, the American National Institute for Standards and Technology (NIST) released a draft version 2.0 of its “notorious CSF”—the Cybersecurity Framework. The […]
How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX
By Benjamin Fabre, CEO & Co-founder, DataDome In the world of e-commerce, ensuring the security of online transactions is crucial. While bot management systems play a significant role in safeguarding […]
When it Comes to ZTNA, Buyer Beware
By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work policies, organizations are turning to the concept of zero trust […]
Closing The Gap: Resolving Human Error in Cloud Security
By Patrick Pocalyko, GM North America, CYREBRO Cybersecurity technology is critical to securing the cloud but it’s easy to forget that people also play an important role. And the fact […]
Tech-Forward Strategies to Effectively Fight Fraud
By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but it has also introduced an onslaught of fraudulent attacks on […]
Why You Should Prioritize Your Privacy Policies
By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created a need for commercial websites in the United States to […]
Steps for Preparing for a Quantum-Resistant Cryptographic Future
By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature of cryptography in our digital world. Virtually every digital connection […]
What is Malvertising?
Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed digital marketing. From tracking customer conversations to measuring engagement with […]
Secure Remote Access is Not a One Size Fits All Vision
Unlocking the puzzle of OT security By Kevin Kumpf, Cybersecurity Evangelist at Cyolo Secure Remote Access (SRA) is a term that can be technologically defined in many ways, depending on […]
Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities
Growing Cyber Attacks Pose Existential Threats to Business – Can More Connected And Efficient Security Help Organizations Gain The Upper Hand? By Emily L. Phelps, Director & Cybersecurity Advocate, Cyware […]
ISO Certification is the Key to Better Cybersecurity for Business
By Sami Mäkiniemelä, Chief Security Officer, Miradore Cyberattacks are on the rise. Every month it seems like another major business gets hit, with their data and customers compromised at an […]
From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs
How to create a well-defined incident response plan By David Chernitzky, Co-founder and CEO, Armour Cybersecurity Cybersecurity incidents can result in significant financial losses, damage to reputation, and compromised customer […]
Six Must-Focus Cybersecurity Areas in Network Sprawl
By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater capacity to accommodate many connected devices hold tremendous potential and […]
Securing Police Communications: Protecting Communities
By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing and the communities they serve. The ability to successfully communicate […]
Key Factors and Measures to Address Burnout In The Cybersecurity Field
The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be on the rise, but one of the biggest threats to […]
Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity
By Avishai Avivi, CISO, SafeBreach The face of cybersecurity is evolving. Cybercrime and its implications have grown into an inescapable fact of our daily lives, affecting everyone from the general […]
Ensuring Container Security: Safeguarding the Future Of Cloud Computing
Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) In today’s fast-paced digital landscape, containerization […]
Passive Optical Networks: A Game Changer for Now And The Future
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC The Department of Defense (DoD) faces challenges in meeting network […]
Will Zero Trust Replace SD-WAN?
By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”. Let’s take a deeper look at both and assess their […]
MOVEit’s Ransomware Attack Highlights the State of Cybersecurity
By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one leading business application vendor learned the hard way in May. […]
Securing the Cloud
Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is now the norm. Up to 94% of enterprises reportedly use […]
How Hacking of The Internet of Things Works In Practice
By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each other using the internet as a communication channel. As it’s […]