Monthly Archives: January 2024

Ditch the Worry – Switch to Secure WhatsApp Alternative

By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […]

Posted in Cyber Security News, Featured | Comments Off on Ditch the Worry – Switch to Secure WhatsApp Alternative

Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead

By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting the mantra of “ruthless prioritization.” The idea sounds pragmatic: with […]

Posted in Cyber Security News | Comments Off on Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead

Protecting Critical Infrastructure from Cyber Attack

The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary, companies need to act now By Richard Staynings, Chief Security […]

Posted in Cyber Security News | Comments Off on Protecting Critical Infrastructure from Cyber Attack

North Korea–Russia Summit

A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong Un took a rare trip beyond his country’s borders – […]

Posted in Cyber Security News | Comments Off on North Korea–Russia Summit

Navigating Secure Adoption of AI Across Government and Connected Infrastructure

By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and industries — including the federal government. AI is being used […]

Posted in Cyber Security News | Comments Off on Navigating Secure Adoption of AI Across Government and Connected Infrastructure

Protecting Your Business and Personal Data

By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public and private sectors, along with tribal communities, join forces to […]

Posted in Cyber Security News | Comments Off on Protecting Your Business and Personal Data

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust

By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order on Improving the Nation’s Cybersecurity, outlining one of the administration’s […]

Posted in Cyber Security News | Comments Off on What the Government Can Learn from the Private Sector in Pursuit of Zero Trust

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on stage saying ‘developers, developers, developers’ at the 1999 Microsoft .NET […]

Posted in Cyber Security News | Comments Off on Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence

By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware to tried and true brute force attacks. At this point, […]

Posted in Cyber Security News | Comments Off on It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT

By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted its 14th annual Cybersecurity Summit in Washington, D.C. Among my […]

Posted in Cyber Security News | Comments Off on Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT

In Pursuit of a Passwordless Future

By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium  Many computer users dream of a day when the industry can move past its reliance on passwords to reach a […]

Posted in Cyber Security News | Comments Off on In Pursuit of a Passwordless Future

How To Improve Security Capacities of The Internet of Things?

By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today. Many IoT assets could get an easy target to cyber […]

Posted in Cyber Security News | Comments Off on How To Improve Security Capacities of The Internet of Things?

How to Create a Threat Hunting Program for Your Business

By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s job is to proactively seek out potential problems and stop […]

Posted in Cyber Security News | Comments Off on How to Create a Threat Hunting Program for Your Business

Expect to Fail: How Organizations Can Benefit from a Breach

By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions in digital security. As CISO, you bear primary responsibility for […]

Posted in Cyber Security News | Comments Off on Expect to Fail: How Organizations Can Benefit from a Breach

Developers Hold the New Crown Jewels. Are They Properly Protected?

By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the globe found themselves faced with accelerating digital transformation initiatives, remote […]

Posted in Cyber Security News | Comments Off on Developers Hold the New Crown Jewels. Are They Properly Protected?

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK

Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital age continues to expand and become ubiquitous across every piece […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK

Data Sanitization for End-Of-Use Assets

Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe are prioritizing Cybersecurity efforts as threats from cyber criminals are […]

Posted in Cyber Security News | Comments Off on Data Sanitization for End-Of-Use Assets

Keeping SaaS Data Under Wraps

By Hananel Livneh, Head of Product Marketing at Adaptive Shield A Case Study on How a $10B Global Media Firm Significantly Improved SaaS Security Posture Media firms in the business […]

Posted in Cyber Security News, Featured | Comments Off on Keeping SaaS Data Under Wraps

When the Enemy Is DDoS, Holistic Protection Is a Must

An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional general, strategist, and philosopher, and certainly one of the most […]

Posted in Cyber Security News | Comments Off on When the Enemy Is DDoS, Holistic Protection Is a Must

Cybersecurity in Digital Afterlife

Managing cybersecurity risks in digital afterlife By Chahak Mittal, GRC Manager, Universal Logistics The concept of the digital afterlife is not merely theoretical; it is a tangible and growing phenomenon. […]

Posted in Cyber Security News | Comments Off on Cybersecurity in Digital Afterlife

Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services

By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity by the financial services industry reaching $600 million annually – a figure which is growing every year – trust in […]

Posted in Cyber Security News | Comments Off on Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services

Common Pitfalls of Running On-Premises SIEM Solutions

By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking to protect their digital environment. They help security teams be […]

Posted in Cyber Security News | Comments Off on Common Pitfalls of Running On-Premises SIEM Solutions

Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers

By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original Chromecast device. The first-generation Chromecast had been a highly successful […]

Posted in Cyber Security News | Comments Off on Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers

ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections

Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu Pavithran, CEO and Founder, Hexnode At the end of August, […]

Posted in Cyber Security News | Comments Off on ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections

DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity

By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These applications need to be built, secured, deployed, and updated on […]

Posted in Cyber Security News | Comments Off on DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity

The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace

By Anurag Lal, President and CEO of NetSfere Using personal messaging apps for business communication and collaboration is harmless – right? Wrong. This practice, which is unfortunately still widespread in […]

Posted in Cyber Security News | Comments Off on The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace

OT Cybersecurity: Safeguarding Building Operations in a Digitized World

By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has cast a shadow over nearly every aspect of our lives. […]

Posted in Cyber Security News | Comments Off on OT Cybersecurity: Safeguarding Building Operations in a Digitized World

How To Combat the Mounting ‘Hacktivist’ Threat

By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These ‘hacktivists’ are actively targeting businesses […]

Posted in Cyber Security News | Comments Off on How To Combat the Mounting ‘Hacktivist’ Threat

Zombie APIs: The Scariest Threat Lurking in The Shadows?

By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles, has caused an exponential increase in the size and scale […]

Posted in Cyber Security News | Comments Off on Zombie APIs: The Scariest Threat Lurking in The Shadows?

7 Steps to Build a Defense in Depth Strategy for Your Home

By Roger Spears – Cybersecurity Project Manager, Schneider Downs One of the primary pillars of cybersecurity is having a “defense in depth” strategy, which means layering defensive security measures to […]

Posted in Cyber Security News | Comments Off on 7 Steps to Build a Defense in Depth Strategy for Your Home

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X