Monthly Archives: December 2023

URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes

By Zack Schwartz, Chief Revenue Officer, Trustifi As a provider of cybersecurity, we notice when certain trends begin to emerge, judging mostly from the interest and response levels that we […]

Posted in Cyber Security News | Comments Off on URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes

The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy

By Mike Nelson, Vice President of Digital Trust, DigiCert It’s safe to say that in 2023, the Internet of Things (IoT) train has left the station and is full speed […]

Posted in Cyber Security News | Comments Off on The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy

The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of

By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these attacks are becoming more dangerous, targeted, and detrimental as they […]

Posted in Cyber Security News | Comments Off on The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of

The Future of Modern Networks Is Automated Threat Intelligence.

By Amit Dhingra, Executive Vice President of Network Services, NTT During the past three years, the enterprise cybersecurity environment has changed drastically. Security threats now come from any number of […]

Posted in Cyber Security News | Comments Off on The Future of Modern Networks Is Automated Threat Intelligence.

The Evolving Landscape of Ransomware Attacks

2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do […]

Posted in Cyber Security News | Comments Off on The Evolving Landscape of Ransomware Attacks

The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security

By Ani Chaudhuri, CEO, Dasera In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation while wary of potential setbacks. This paper zeroes in on […]

Posted in Cyber Security News | Comments Off on The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security

The Case Study: The Exploitation of Business Assets

By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business assets using the IoT search engines and some hacking tools. […]

Posted in Cyber Security News | Comments Off on The Case Study: The Exploitation of Business Assets

Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.

By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in their EMR’s. While there are significant benefits here, it does […]

Posted in Cyber Security News | Comments Off on Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.

Securing The Virtual Runway to The Cloud

By Jason Mafera, Field CTO, North America, IGEL The ‘endpoint’ has transformed from traditional desktop hardware to any number of devices, digital workspaces, and locations, offering new opportunities for cybercriminals […]

Posted in Cyber Security News | Comments Off on Securing The Virtual Runway to The Cloud

Proven Strategies to Fix This Cybersecurity Shortage

Cyber Leader and Former Marine breaks down how we can recruit and train new cyber talent for this growing tech labor shortage By Chris Starling, Assistant Vice President, NPower Skillbridge […]

Posted in Cyber Security News | Comments Off on Proven Strategies to Fix This Cybersecurity Shortage

Beyond Mere Compliance

Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […]

Posted in Cyber Security News | Comments Off on Beyond Mere Compliance

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […]

Posted in Cyber Security News | Comments Off on Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Cyber Strategy Is Not a Synonym for Tech Stack

By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […]

Posted in Cyber Security News | Comments Off on Cyber Strategy Is Not a Synonym for Tech Stack

Combatting Social Engineering – The Invisible Threat

By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […]

Posted in Cyber Security News | Comments Off on Combatting Social Engineering – The Invisible Threat

The Persistent Danger of Remcos RAT

By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information on the most prevalent threats and tactics used by malicious […]

Posted in Cyber Security News | Comments Off on The Persistent Danger of Remcos RAT

How to Overcome the Most Common Challenges with Threat Intelligence

By David Monnier, Chief Evangelist, Team Cymru Fellow What would be your ideal approach to protecting your organization? Knowing exactly what threats are targeting your organization, well before those adversaries […]

Posted in Cyber Security News | Comments Off on How to Overcome the Most Common Challenges with Threat Intelligence

How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk

By Amol Bhagwat, VP, Solutions and Field Engineering at Gurucul As the threat landscape continues to get more complex, security analytics are becoming essential for identifying, preventing and responding to […]

Posted in Cyber Security News | Comments Off on How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […]

Posted in Cyber Security News | Comments Off on Stronger Together: Attack Surface Management and Security Validation

Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies

Critical for organizations to understand attackers’ tactics, techniques, and procedures. By Bobby Cornwell, Vice President, Strategic Partnership Enablement & Integration, SonicWall The 2023 mid-year cyber threat report card portends an […]

Posted in Cyber Security News | Comments Off on Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies

Digital Criminal Ontology; Trading Pistols for Programmers

By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. In 1983, WarGames was released. […]

Posted in Cyber Security News | Comments Off on Digital Criminal Ontology; Trading Pistols for Programmers

Forging A New Era of Invoicing Security

How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be the first thing that pops up in a conversation around […]

Posted in Cyber Security News | Comments Off on Forging A New Era of Invoicing Security

Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first:  Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust

Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments

By  Ofer Tirosh In today’s interconnected, globalized world, the need for communication across multiple languages is more important than ever. But with increased connectivity and linguistic diversity comes a new […]

Posted in Cyber Security News | Comments Off on Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments

Anticipation And Agility: Cyber Protection for the 2024 Olympics

By Jacques de La Rivière, CEO, Gatewatcher From July 26 to September 8 next year, Paris will host the 2024 Olympic and Paralympic Games. With less than a year before […]

Posted in Cyber Security News | Comments Off on Anticipation And Agility: Cyber Protection for the 2024 Olympics

How Are Security Professionals Managing the Good, The Bad and The Ugly of ChatGPT?

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Today, headlines surrounding AI tools such as ChatGPT today are largely pessimistic. From the doom-mongering narrative that technologies will put millions out […]

Posted in Cyber Security News | Comments Off on How Are Security Professionals Managing the Good, The Bad and The Ugly of ChatGPT?

Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities

By Julie Taylor, Tech Principal, Joyn Holdings LTD & Jacob Dahlman, Team Lead, Joyn Holdings LTD In an increasingly digital world, the safety of our children on the internet has […]

Posted in Cyber Security News | Comments Off on Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities

AI in Cybersecurity

Separating Hype from Hyperbole By Avkash Kathiriya “Artificial Intelligence in cybersecurity is like a supercharged virtual fortress armed with a gazillion laser-focused cyber warriors, ready to annihilate any threat with […]

Posted in Cyber Security News | Comments Off on AI in Cybersecurity

The Corporate Transparency Act: Striking a Pact Between Fact & Privacy Impact

By Tom Aldrich, Chief Strategy Officer, 360 Privacy The Corporate Transparency Act (CTA) became law in the United States as part of the National Defense Authorization Act for FY2021. This […]

Posted in Cyber Security News | Comments Off on The Corporate Transparency Act: Striking a Pact Between Fact & Privacy Impact

Why Not Shut Off Access to The Internet Whenever a Password Is Saved

AND then never have to type a password again? By Irwin Gretczko, Founder & CEO, The Hack Blocker So, what about the customer? Let’s think about the banking, brokerage, or […]

Posted in Cyber Security News | Comments Off on Why Not Shut Off Access to The Internet Whenever a Password Is Saved

Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations

By George Gerchow, CSO and SVP of IT, Sumo Logic Corporate security and compliance teams are scrambling to understand the implications of the U.S. Security and Exchange Commission’s (SEC) recently […]

Posted in Cyber Security News | Comments Off on Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X