Monthly Archives: April 2024

The Case Study: The Exploitation of Mechatronics Systems

By Milica D. Djekic The mechatronics systems are a common part of the industrial control systems (ICS) or – in other words – these two assets serve in many control […]

Posted in Cyber Security News | Comments Off on The Case Study: The Exploitation of Mechatronics Systems

Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience

By Boris Khazin, Head of Governance, Risk & Compliance at EPAM Systems, Inc. While concerns about market volatility, liquidity management and fintech disruption are among the many challenges financial services […]

Posted in Cyber Security News | Comments Off on Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience

Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership

By Craig Burland, CISO, Inversion6 In the C-Suites and boardrooms of modern enterprises, there’s an unwelcome guest that often disrupts the conviviality of strategic discussions: cyber-truth. Cyber-truth is the unvarnished […]

Posted in Cyber Security News | Comments Off on Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership

SASE and Zero Trust: A Powerful Combination

By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It was protected by a robust drawbridge and moat. In our […]

Posted in Cyber Security News | Comments Off on SASE and Zero Trust: A Powerful Combination

Government Communications: The Threats

By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have never been more vulnerable. The digital age has ushered in […]

Posted in Cyber Security News | Comments Off on Government Communications: The Threats

A 5-Minute Refresher to Cryptography

 (featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on A 5-Minute Refresher to Cryptography

Smart Traffic Signals Security in the Era of AI and Smart Cars

Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once a simple concept with red, yellow, and green bulbs, traffic […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Smart Traffic Signals Security in the Era of AI and Smart Cars

Bridging IT and OT Cybersecurity with AI

Reduce Alerts by 57% with Difenda AIRO By Andrew Hodges, VP Service Delivery & Product Development, Difenda In a technology-driven world, where even the most everyday devices are connected to […]

Posted in Cyber Security News | Comments Off on Bridging IT and OT Cybersecurity with AI

Accelerate the path to PCI DSS 4.0 adoption

By Héctor Guillermo Martínez, President of GM Sectec With the release of a new version of the PCI DSS 4.0 Payment Card Industry Data Security Standard, the safety and security […]

Posted in Cyber Security News | Comments Off on Accelerate the path to PCI DSS 4.0 adoption

Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy

Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani, CEO and Co-founder, Stream Security Cybersecurity teams are often at […]

Posted in Cyber Security News | Comments Off on Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy

QR Code Phishing Attacks: Threat Actors Are Now Shopping Online with You

Olesia Klevchuk, Director of Email Protection at Barracuda, discusses the prevalence of QR code phishing attacks and how cybercriminals are utilizing quishing to exploit data, download malware, compromise personal devices, […]

Posted in Cyber Security News | Comments Off on QR Code Phishing Attacks: Threat Actors Are Now Shopping Online with You

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X