Monthly Archives: April 2024

Hacking and Cybersecurity

Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying on top of a constantly evolving arsenal of attack strategies […]

Posted in Cyber Security News | Comments Off on Hacking and Cybersecurity

Stop Managing Identities, Segment them Instead

By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management  For as long as there have been identities, there have been solutions trying to manage them so […]

Posted in Cyber Security News | Comments Off on Stop Managing Identities, Segment them Instead

Good Security Is About Iteration, Not Perfection.

By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a futile and counterproductive pursuit. There are too many threats to […]

Posted in Cyber Security News | Comments Off on Good Security Is About Iteration, Not Perfection.

GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages

By Dwayne McDaniel, GitGuardian Developer and Security Advocate, GitGuardian The modern world of DevOps means relying on our code connecting to outside services and components imported at run time. All […]

Posted in Cyber Security News | Comments Off on GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages

Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing

By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity measures more critical than ever. As organizations are doing everything they can […]

Posted in Cyber Security News | Comments Off on Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing

Data Breach Search Engines

Navigating Access and Security in the Stolen Credentials Landscape By Tom Caliendo, Cybersecurity Reporter, Co-Founder at Brocket Consulting LLC In the last few years, an unprecedented number of stolen login […]

Posted in Cyber Security News | Comments Off on Data Breach Search Engines

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

Cybersecurity Trends and Predictions for 2024

By Nick France, CTO at Cybersecurity Leader Sectigo Given the fact that bad actors are always on the prowl, 2024 is off to a fast start with numerous cybersecurity incidents […]

Posted in Cyber Security News | Comments Off on Cybersecurity Trends and Predictions for 2024

AI is Revolutionizing Phishing for Both Sides. What will make the Difference?

Thanks to AI, phishing attacks are better than ever. So is our ability to stop them. By Antonio Sanchez, Principal Cybersecurity Evangelist at Fortra AI has always been a lurking […]

Posted in Cyber Security News | Comments Off on AI is Revolutionizing Phishing for Both Sides. What will make the Difference?

Crafting AI’s Future: Decoding the AI Executive Order

By: Rajat Kohli, Partner at Zinnov There is something to be learned from epic fantasy productions like Harry Potter. That every few years, there will be a gifted wizard who […]

Posted in Cyber Security News | Comments Off on Crafting AI’s Future: Decoding the AI Executive Order

Weighing Down Cyberrisk Options: How to Make Objective Cybersecurity Decisions Without Negatively Impacting the Organization’s IT Teams?

By Mike Starr, CEO of Trackd It’s often paid lip service to (or worse, intentionally neglected), and rarely appreciated, but there’s an operational cost to be paid for security. Security […]

Posted in Cyber Security News | Comments Off on Weighing Down Cyberrisk Options: How to Make Objective Cybersecurity Decisions Without Negatively Impacting the Organization’s IT Teams?

Connecting Tech to Black America

By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem inaccessible and intimidating for the everyday person. For Black Americans […]

Posted in Cyber Security News | Comments Off on Connecting Tech to Black America

The Importance of Cyber Hygiene for Businesses

By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3 trillion worldwide by 2025, and it’s growing fast. It’s a […]

Posted in Cyber Security News | Comments Off on The Importance of Cyber Hygiene for Businesses

5 Cybersecurity Resolutions for the New Year

By Roger Spears, Schneider Downs Whenever the new year rolls around, resolutions—to achieve a goal, improve a behavior or continue good practices—abound. And, while many resolutions center personal goals such […]

Posted in Cyber Security News | Comments Off on 5 Cybersecurity Resolutions for the New Year

Hybrid Working is Changing How We Think About Security

By Prakash Mana, CEO, Cloudbrink Security will continue to head the list of priorities for CISOs in 2024, but how we secure our enterprises will need rethinking in the face […]

Posted in Cyber Security News | Comments Off on Hybrid Working is Changing How We Think About Security

Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Adapting to the Deluge of Cybersecurity Data

By Charlie Thomas, CEO, Deepwatch The ever-increasing volume of security data is becoming unmanageable through conventional data analysis, security tools and management techniques. Security teams are deluged with logs, events, […]

Posted in Cyber Security News | Comments Off on Adapting to the Deluge of Cybersecurity Data

When Security Collides with Customer Impatience

How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […]

Posted in Cyber Security News | Comments Off on When Security Collides with Customer Impatience

Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

by Lena Allen Introduction In this era of unprecedented technological interconnectedness, the safeguarding of critical infrastructure against cyber threats has ascended to a pinnacle of national security importance for the […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

DevSecOps Practices for a Secure Cloud

How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […]

Posted in Cyber Security News | Comments Off on DevSecOps Practices for a Secure Cloud

Vendors Beware of the Cybersecurity Audit

By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […]

Posted in Cyber Security News | Comments Off on Vendors Beware of the Cybersecurity Audit

How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance

And What We Can Learn From It By Brian Hesse, Co-Owner, President, and Chief Executive Officer of PerenniAL Summary Cybersecurity professionals, as with virtually every other organizational function, are always […]

Posted in Cyber Security News | Comments Off on How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance

Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet: 2024 Cybersecurity Predictions

By Chris Scheels, VP of Product Marketing at Gurucul How will security analytics, machine learning/AI, and applied data science in the security space evolve in the coming year? Here are […]

Posted in Cyber Security News | Comments Off on Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet: 2024 Cybersecurity Predictions

Zero Trust: Navigating the Labyrinth of Laws in a Borderless Digital Age

By Jaye Tillson, Director of Strategy & Field CTO, Axis Security The digital landscape, once akin to a fortified city with well-defined perimeters safeguarding precious data, now faces the onslaught […]

Posted in Cyber Security News | Comments Off on Zero Trust: Navigating the Labyrinth of Laws in a Borderless Digital Age

Three Key Threats Fueling the Future of Cyber Attacks

By Rishi Baviskar, Global Head of Cyber Risk Consulting at Allianz Commercial Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat […]

Posted in Cyber Security News | Comments Off on Three Key Threats Fueling the Future of Cyber Attacks

The Role of Identity Data Management in Achieving CISA’S Strategic Goals

By Wade Ellery, Field Chief Technology Officer at Radiant Logic Cyber threats such as ransomware, zero-day exploits, phishing and supply chain attacks are increasing globally, regardless of industry or size. […]

Posted in Cyber Security News | Comments Off on The Role of Identity Data Management in Achieving CISA’S Strategic Goals

Zero Trust Access: The Transformative Blueprint for Achieving Regulatory Compliance

Ironclad compliance through the Zero Trust innovation mindset By Roy Kikuchi, Director of Strategic Alliances at Safous, Internet Initiative Japan (IIJ) Inc. Regulatory requirements like GDPR, CCPA, and data residency […]

Posted in Cyber Security News | Comments Off on Zero Trust Access: The Transformative Blueprint for Achieving Regulatory Compliance

The Quantum Shift

Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I intend to commence this piece with a hypothetical calamitous situation. […]

Posted in Cyber Security News | Comments Off on The Quantum Shift

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on CISO Life: the Good, the Bad, the Ugly

The Pitfalls of Periodic Penetration Testing & What to Do Instead

Periodic penetration testing approaches can be likened to regular tire inspections for vehicles. While they provide valuable insights into the condition of your tires during each check-up, they cannot help […]

Posted in Cyber Security News | Comments Off on The Pitfalls of Periodic Penetration Testing & What to Do Instead

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X