Monthly Archives: November 2023

How to Avoid Common Security Incidents in the Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […]

Posted in Cyber Security News | Comments Off on How to Avoid Common Security Incidents in the Public Cloud

From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies

By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security concept in the early 2000s, it was largely focused on […]

Posted in Cyber Security News | Comments Off on From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies

IP network security in the age of DDoS and quantum computing

By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […]

Posted in Cyber Security News | Comments Off on IP network security in the age of DDoS and quantum computing

E-mail Compromise

How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […]

Posted in Cyber Security News | Comments Off on E-mail Compromise

Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market

The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient privacy, secure data integrity, and ensure the uninterrupted delivery of […]

Posted in Cyber Security News | Comments Off on Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market

Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

By Archie Agarwal, Founder and CEO of ThreatModeler The Great Earthquake of San Francisco in 1906 caused unbelievable levels of damage in the city, with over 28,000 buildings destroyed and […]

Posted in Cyber Security News | Comments Off on Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts

If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George Tubin, Director of Product Strategy, Cynet The U.S. travel market […]

Posted in Cyber Security News | Comments Off on With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts

Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors

By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic algorithms to protect against most quantum attacks. The threats of […]

Posted in Cyber Security News | Comments Off on Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors

National Cyber Security Vulnerabilities in The Changing Security Environment

Implications For the Resilience of The NATO Cyber and Information Space By Georgi Atanasov, Subject Matter Expert in Bulgarian ministry of defense In the changed security environment states are seeking […]

Posted in Cyber Security News | Comments Off on National Cyber Security Vulnerabilities in The Changing Security Environment

Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?

By Moty Kanias, VP of Cyber Strategy & Alliances, NanoLock Security Great businesses understand that their people are their most important assets.  But there is another side to that coin.  […]

Posted in Cyber Security News | Comments Off on Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?

4 Key Security Challenges to Address with Confidential Computing

Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data By Simon Johnson, Senior Principal Engineer at Intel Over the […]

Posted in Cyber Security News | Comments Off on 4 Key Security Challenges to Address with Confidential Computing

Visibility Isn’t Enough; It’s What You Do with It That Counts

By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise As cyber risks continue to grow and evolve (here’s looking at you, generative AI) – more and more vulnerabilities are […]

Posted in Cyber Security News | Comments Off on Visibility Isn’t Enough; It’s What You Do with It That Counts

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises

By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital landscape, and the failure of legacy cybersecurity tools and methods, […]

Posted in Cyber Security News | Comments Off on Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises

Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?

By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the final Cloud Smart strategy, which was the government’s update to […]

Posted in Cyber Security News | Comments Off on Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?

Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser

By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue, but there’s little consensus about what to do about it. […]

Posted in Cyber Security News | Comments Off on Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […]

Posted in Cyber Security News | Comments Off on Institutionalizing Awareness to Stop Cyberattacks

How Google Play Store Security May Fail to Protect Users from Stealthy Malware

Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading operating system in the smartphone industry with more than 71% […]

Posted in Cyber Security News | Comments Off on How Google Play Store Security May Fail to Protect Users from Stealthy Malware

Who are the Wagner PMCs of Russia

Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of June, a Russian mercenary organization known as ‘Wagner’ has mutinied […]

Posted in Cyber Security News | Comments Off on Who are the Wagner PMCs of Russia

How Can We Turn a Hacker’s Toolkit Against Them? The Evolution of a Phishing Email

By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with the sophistication of attacks escalating rapidly, it’s vital we understand […]

Posted in Cyber Security News | Comments Off on How Can We Turn a Hacker’s Toolkit Against Them? The Evolution of a Phishing Email

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on There Are Cyberheroes: THE VIGILANCE MANIFESTO

Anything Is Hackable: Consumers Must Not Be Caught Out

In an age driven by data, cyber-related crimes are on the rise. Business leaders must invest in new strategies designed to keep their customers and their personal data safe from […]

Posted in Cyber Security News | Comments Off on Anything Is Hackable: Consumers Must Not Be Caught Out

Securing the Future of Data Security Through Transparency: A Glimpse into Quantum Random Number Generators Research & Development

By Denis Mandich, Co-Founder and Chief Technology Officer of Qrypt Software supply chain security is a major concern in today’s digital world. In 2019, bad actors hacked the software compilation […]

Posted in Cyber Security News | Comments Off on Securing the Future of Data Security Through Transparency: A Glimpse into Quantum Random Number Generators Research & Development

Publishers Spotlight: The Syndicate Group (TSG)

The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem of strategic investors including more than 450 leading channel partner […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Publishers Spotlight: The Syndicate Group (TSG)

Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats

By Brett Raybould, EMEA Solutions Architect, Menlo Security  According to Google, the average worker now spends three-quarters of their working day using a web browser. This has provided many productivity […]

Posted in Cyber Security News | Comments Off on Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding of the necessity and benefits of cybersecurity preparedness that can […]

Posted in Cyber Security News, Featured | Tagged , , , , , | Comments Off on Spotlight: Whitepaper: Information security for the medical device industry

Building A Secure Integrated Collaboration Platform

By Allen Drennan, Principal & Co-Founder, Cordoniq Integrated collaboration platforms improve and enhance the experiences of hybrid and remote employees. Robust and comprehensive platforms are crucial to remote work environment […]

Posted in Cyber Security News | Comments Off on Building A Secure Integrated Collaboration Platform

Quantum Security is National Security

By Andy Manoske, Principal Product Manager of Cryptography and Security Products at HashiCorp Quantum computers will be one of the defining frontiers in computing over the next century. Utilizing the […]

Posted in Cyber Security News | Comments Off on Quantum Security is National Security

Border Crossing: A New Battle Over Governments Extending Information Mandates Beyond National Security to National Interest

By George T. Tziahanas, AGC and VP of Compliance, Archive360 It might seem counterintuitive that in a distributed digital world, the location of data is increasingly important. However, based on […]

Posted in Cyber Security News | Comments Off on Border Crossing: A New Battle Over Governments Extending Information Mandates Beyond National Security to National Interest

A New Ai Arms Race

By Alex Fink, CEO of the Otherweb The internet has seen its share of arms races in recent decades. The advent of viruses resulted in an ongoing battle between those […]

Posted in Cyber Security News | Comments Off on A New Ai Arms Race

The Rising Role of Artificial Intelligence in The Cybersecurity Market

By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) In an era of digital transformation, where organizations rely heavily on technology and data […]

Posted in Cyber Security News | Comments Off on The Rising Role of Artificial Intelligence in The Cybersecurity Market

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X