Monthly Archives: March 2024

The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market companies. In fact, Deloitte’s 2023 Mid-Market Technology Trend report found […]

Posted in Cyber Security News | Comments Off on The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved […]

Posted in Cyber Security News | Comments Off on The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around […]

Posted in Cyber Security News | Comments Off on Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

Safeguarding the Code That Drives Modern Vehicles

By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […]

Posted in Cyber Security News | Comments Off on Safeguarding the Code That Drives Modern Vehicles

Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset

By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […]

Posted in Cyber Security News | Comments Off on Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset

Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack

by Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […]

Posted in Cyber Security News | Comments Off on Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack

AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud

By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as a whole. This is a problem that is accelerating as […]

Posted in Cyber Security News | Comments Off on AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud

SIEM vs XDR: Capabilities and Key Differences

We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […]

Posted in Cyber Security News, Featured | Comments Off on SIEM vs XDR: Capabilities and Key Differences

2024 Predictions: The Rise of AI Brings New Security Challenges

By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […]

Posted in Cyber Security News | Comments Off on 2024 Predictions: The Rise of AI Brings New Security Challenges

Generative Ai: The Future of Cloud Security

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […]

Posted in Cyber Security News | Comments Off on Generative Ai: The Future of Cloud Security

What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?

By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating that someone had made a purchase from my account. They […]

Posted in Cyber Security News | Comments Off on What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?

Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective

By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key decision makers. This disconnect may be one of the reasons […]

Posted in Cyber Security News | Comments Off on Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X