Monthly Archives: April 2024
The Case Study: The Exploitation of Mechatronics Systems
By Milica D. Djekic The mechatronics systems are a common part of the industrial control systems (ICS) or – in other words – these two assets serve in many control […]
Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience
By Boris Khazin, Head of Governance, Risk & Compliance at EPAM Systems, Inc. While concerns about market volatility, liquidity management and fintech disruption are among the many challenges financial services […]
Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership
By Craig Burland, CISO, Inversion6 In the C-Suites and boardrooms of modern enterprises, there’s an unwelcome guest that often disrupts the conviviality of strategic discussions: cyber-truth. Cyber-truth is the unvarnished […]
SASE and Zero Trust: A Powerful Combination
By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It was protected by a robust drawbridge and moat. In our […]
Government Communications: The Threats
By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have never been more vulnerable. The digital age has ushered in […]
A 5-Minute Refresher to Cryptography
(featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […]
Smart Traffic Signals Security in the Era of AI and Smart Cars
Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once a simple concept with red, yellow, and green bulbs, traffic […]
Bridging IT and OT Cybersecurity with AI
Reduce Alerts by 57% with Difenda AIRO By Andrew Hodges, VP Service Delivery & Product Development, Difenda In a technology-driven world, where even the most everyday devices are connected to […]
Accelerate the path to PCI DSS 4.0 adoption
By Héctor Guillermo Martínez, President of GM Sectec With the release of a new version of the PCI DSS 4.0 Payment Card Industry Data Security Standard, the safety and security […]
Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy
Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani, CEO and Co-founder, Stream Security Cybersecurity teams are often at […]
QR Code Phishing Attacks: Threat Actors Are Now Shopping Online with You
Olesia Klevchuk, Director of Email Protection at Barracuda, discusses the prevalence of QR code phishing attacks and how cybercriminals are utilizing quishing to exploit data, download malware, compromise personal devices, […]