Monthly Archives: March 2024

Protecting Data in The Final Stretch of The Supply Chain

Building a Secure Last Mile for Global Commerce By Dan O’Toole, Chairman & CEO, Arrive Navigating the Last Mile: Securing the Final Stretch of the Supply Chain In the rapidly […]

Posted in Cyber Security News | Comments Off on Protecting Data in The Final Stretch of The Supply Chain

Passwords In the Air

By Gautam Hazari, Chief Technology Officer, Sekura.id Imagine, you are sitting in a café, sipping the skillfully crafted coffee by the barista, with your laptop placed on the table in […]

Posted in Cyber Security News | Comments Off on Passwords In the Air

Organizations Are Shifting Ransomware Defense Tactics, But Malware Is Still the Problem

By Trevor Hilligoss, Senior Director of Security Research at SpyCloud Ransomware attacks are a fact of life – over 72% of global businesses have been impacted by ransomware in 2023. This number […]

Posted in Cyber Security News | Comments Off on Organizations Are Shifting Ransomware Defense Tactics, But Malware Is Still the Problem

Open AI Exec Warns AI is “Extremely Addictive,” Humanity Could Become “Enslaved”

By Sai Mattapalli and Rohan Kalahasty, Co-Founders — Vytal.ai The idea of technology going wrong and turning on its creators is not new. More than 200 years ago, Mary Shelley […]

Posted in Cyber Security News | Comments Off on Open AI Exec Warns AI is “Extremely Addictive,” Humanity Could Become “Enslaved”

Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity on the Factory Floor

By Berardino Baratta, CEO, MxD Manufacturing in the United States is changing. Today’s factory floors are a far cry from those we saw in 1980s movies – dark, hostile environments […]

Posted in Cyber Security News | Comments Off on Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity on the Factory Floor

Making Our Infrastructure Resilient: 5 Priorities for Security R&D

By Saurabh Amin, Professor of Civil and Environmental Engineering PI, Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cyberattacks are undoubtedly on the rise; as of September 2023, […]

Posted in Cyber Security News | Comments Off on Making Our Infrastructure Resilient: 5 Priorities for Security R&D

Key Differences in Securing OT & IT Environments

Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of Corporate Development, Cyolo The increasing cyberattacks against critical sectors, in […]

Posted in Cyber Security News | Comments Off on Key Differences in Securing OT & IT Environments

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […]

Posted in Cyber Security News | Comments Off on Institutionalizing Awareness to Stop Cyberattacks

Implementing ZTA: Benefits and Best Practices

By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of industrial systems, the realm of cybersecurity has been thrust into […]

Posted in Cyber Security News | Comments Off on Implementing ZTA: Benefits and Best Practices

Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report

Cyberdefenders plug the holes, so attackers innovate to try to stay ahead. By Aaron Walton, Threat Intel Analyst, Expel Most cyberattackers don’t try to reinvent the wheel: as long as […]

Posted in Cyber Security News | Comments Off on Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report

What are the Essential Skills for Cyber Security Professionals in 2024?

Where should you invest time and resources to drive success when it comes to the must-have skills and tools for senior leaders in the industry. By Sarah Gilchriest, Chief People […]

Posted in Cyber Security News | Comments Off on What are the Essential Skills for Cyber Security Professionals in 2024?

Enhancing The Nation’s Cybersecurity Workforce

Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […]

Posted in Cyber Security News | Comments Off on Enhancing The Nation’s Cybersecurity Workforce

Does Zero Trust Improve Productivity?

By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […]

Posted in Cyber Security News | Comments Off on Does Zero Trust Improve Productivity?

Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy

WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy are becoming more and more critical with digital transformation. The […]

Posted in Cyber Security News | Comments Off on Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy

Cybersecurity Threats in Global Satellite Internet

By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […]

Posted in Cyber Security News | Comments Off on Cybersecurity Threats in Global Satellite Internet

Classic Information Security Management Errors

How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […]

Posted in Cyber Security News | Comments Off on Classic Information Security Management Errors

How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?

By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating systems has become a critical concern for organizations of all […]

Posted in Cyber Security News | Comments Off on How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?

Prioritizing Action After the Threat Headlines

By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […]

Posted in Cyber Security News | Comments Off on Prioritizing Action After the Threat Headlines

Introducing GitHub Insights, Latest Solution to Combat Growing Threat to APIs

By Scott Gerlach, CSO – StackHawk The accelerated demand for software applications and application programming interfaces (APIs) across industries has caused organizations’ attack surfaces to become larger than ever before. […]

Posted in Cyber Security News | Comments Off on Introducing GitHub Insights, Latest Solution to Combat Growing Threat to APIs

Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security

Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly mobile networks, have become the backbone of our modern, interconnected […]

Posted in Cyber Security News | Comments Off on Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security

Deepfakes and AI’s New Threat to Security

The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […]

Posted in Cyber Security News | Comments Off on Deepfakes and AI’s New Threat to Security

A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding the digital assets of a thriving healthcare organization renowned for […]

Posted in Cyber Security News | Comments Off on A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary

Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my recent articles, I’ve discussed the importance of looking beyond resumes […]

Posted in Cyber Security News | Comments Off on Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary

Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents

The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke Bader, Director, Membership and Programs, FAIR Institute The FAIR Institute, […]

Posted in Cyber Security News | Comments Off on Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […]

Posted in Cyber Security News | Comments Off on Addressing Bias in Insider Risk Monitoring

How Cloud Solutions Can Lead to Stronger, More Secure IT Operations

By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of $12.3 billion on cloud goods and services – a 30 […]

Posted in Cyber Security News | Comments Off on How Cloud Solutions Can Lead to Stronger, More Secure IT Operations

What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future

By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication networks. However, even as we rely on it to safeguard […]

Posted in Cyber Security News | Comments Off on What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future

How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry

Cybersecurity will be one of the key concerns as last-mile logistics companies look to enhance efficiency with autonomous vehicles. By Anar Mammadov, CEO, Senpex Technologies Travelers who hail a taxi […]

Posted in Cyber Security News | Comments Off on How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry

OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

ImmuniWeb AI Platform

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […]

Posted in Cyber Security News, Featured | Comments Off on ImmuniWeb AI Platform

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X