Monthly Archives: May 2024

CTI for M&A

Active dark web Intelligence to aid M&A  By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and acquisitions (M&A) at some point to acquire a competitor, expand […]

Posted in Cyber Security News | Comments Off on CTI for M&A

Is Zero Trust Enough?

Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt Iron Backup has always been seen as the last line […]

Posted in Cyber Security News | Comments Off on Is Zero Trust Enough?

Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape

By Tony King, SVP International at NETSCOUT In today’s world, where the digital landscape is rapidly evolving, the cyber threat level is continuing to grow. Cybercriminals are constantly refining their […]

Posted in Cyber Security News | Comments Off on Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape

Full Drive Encryption Only a Half-Measure for Data Security

Pre-Boot Authentication Is the Missing Half By John Benkert, Cigent CEO and Co-founder In an era where data security breaches are not just incidents but an event that can topple […]

Posted in Cyber Security News | Comments Off on Full Drive Encryption Only a Half-Measure for Data Security

AI, Deepfakes and Digital ID: The New Frontier of Corporate Cybersecurity

By Michael Marcotte, Founder & CEO of artius.iD The emergence of deepfakes fired the starting pistol in a cybersecurity arms race. Paranoia about their impact has rippled out into a […]

Posted in Cyber Security News | Comments Off on AI, Deepfakes and Digital ID: The New Frontier of Corporate Cybersecurity

How Empathetic Leadership Can Shape the Future of Inclusion in Cybersecurity

By Lauren Neal, Founder and Chief Programme Creator, Valued at Work In the fast-paced world of technology, the importance of inclusion cannot be overstated. The cybersecurity industry is a powerhouse […]

Posted in Cyber Security News | Comments Off on How Empathetic Leadership Can Shape the Future of Inclusion in Cybersecurity

Building AI on a Foundation of Open Source Requires a Fundamentally New Approach to Application Security

By Nadav Czerninski, Co-founder and CEO, Oligo Security AI has sprung from the pages of science fiction into our daily lives. The AI revolution is now accelerating, enabled by open-source […]

Posted in Cyber Security News | Comments Off on Building AI on a Foundation of Open Source Requires a Fundamentally New Approach to Application Security

Bridging The Gap: Diversity Cyber Council and The Emergence of Tech as The New Opportunity Frontier

Diversity Cyber Council Initiative By Donna Segura, Publicist: OleanderPR In a world where technology is rapidly redefining every aspect of our lives, there’s a burgeoning recognition of the need for […]

Posted in Cyber Security News | Comments Off on Bridging The Gap: Diversity Cyber Council and The Emergence of Tech as The New Opportunity Frontier

Beyond Code: Harnessing AI for Advanced Cybersecurity Solutions

By Angel Vossough, Co-Founder & CEO of BetterAI.io Cybersecurity defenses are shifting, aiming to predict and block cyber threats in advance, acting as digital guardians attempting to stay one step […]

Posted in Cyber Security News | Comments Off on Beyond Code: Harnessing AI for Advanced Cybersecurity Solutions

Best Password Generators of 2024 to Secure Your Accounts

Overview of best password generators to secure online accounts By Mia Naumoska, CMO at Internxt Despite the current advances in technology, one thing that has stood the test of time […]

Posted in Cyber Security News | Comments Off on Best Password Generators of 2024 to Secure Your Accounts

Becoming Resilient to The Cyber Incidents of Today And Tomorrow

By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are solid to withstand potential cyber incidents. Developing organizational resilience involves […]

Posted in Cyber Security News | Comments Off on Becoming Resilient to The Cyber Incidents of Today And Tomorrow

Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network

By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect all of your company’s devices as cyber adversaries can turn […]

Posted in Cyber Security News | Comments Off on Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network

The Critical Role of Training and Phishing Testing in Safeguarding Financial Data

Empowering the Human Firewall: The Bedrock of Cyber Defense By Michael Cocanower, CEO, AdviserCyber The Evolving Cybersecurity Landscape for RIAs and Professionals For Registered Investment Advisers (RIAs) and cybersecurity professionals […]

Posted in Cyber Security News | Comments Off on The Critical Role of Training and Phishing Testing in Safeguarding Financial Data

A Transformative Landscape in Legal Technology: From the Past to AI-Powered Future

By Rob Scott, Chief Innovator – Monjur The modern digital era, ripe with unparalleled technological evolutions, is remolding our perceptions and expectations at a pace once thought inconceivable. Among all […]

Posted in Cyber Security News | Comments Off on A Transformative Landscape in Legal Technology: From the Past to AI-Powered Future

2024: The Year of Secure Design

By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […]

Posted in Cyber Security News | Comments Off on 2024: The Year of Secure Design

6 Factors to Consider When Choosing a SIEM Solution

Don’t Settle for Less | Make an Informed Decision By Krunal Mendapara, Chief Technology Officer, Sattrix Group In today’s world, cyber threats are more rampant than ever before. It’s no […]

Posted in Cyber Security News | Comments Off on 6 Factors to Consider When Choosing a SIEM Solution

Fortifying Digital Health Against Cyber Attacks

By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […]

Posted in Cyber Security News | Comments Off on Fortifying Digital Health Against Cyber Attacks

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Strengthening Cyber Defense with Threat Intelligence Operations

A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology

By Kimberly Sutherland, vice president, fraud and identity strategy, LexisNexis® Risk Solutions Digital fraud has seen a substantial increase in recent years, mainly due to the sharp rise in digital […]

Posted in Cyber Security News | Comments Off on A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology

Cybersecurity or Cyber Resilience: Which Matters More?

Planning Beyond an Enterprise Security Posture and Toward Reliable Business Continuity By Amanda Satterwhite, Managing Director of Cyber Growth & Strategy, Accenture Federal Services Cybercrimes in the United States have […]

Posted in Cyber Security News | Comments Off on Cybersecurity or Cyber Resilience: Which Matters More?

Unlocking the Power of Governance in Cybersecurity: NIST CSF 2.0 Introduces ‘Govern’ to Redefine CISO Leadership in 2024

By Shirley Salzman, CEO and Co-Founder, SeeMetrics As all eyes are towards the updated NIST CSF 2.0 publication, some of the spoilers have already been published – now security leaders […]

Posted in Cyber Security News, Featured | Comments Off on Unlocking the Power of Governance in Cybersecurity: NIST CSF 2.0 Introduces ‘Govern’ to Redefine CISO Leadership in 2024

Will We Ever See Federal Data Breaches End Entirely?

Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a problem in virtually every industry. However, they carry extra weight […]

Posted in Cyber Security News | Comments Off on Will We Ever See Federal Data Breaches End Entirely?

Why Is Hardware More Secure than Software?

The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority of today’s cryptographic implementations rely on software running on general-purpose […]

Posted in Cyber Security News | Comments Off on Why Is Hardware More Secure than Software?

Three Rules of Crisis Management: Lessons from the War in Israel

Crises and challenges are a staple of the technology and cybersecurity industries. While we do our best to plan for growth, setbacks, and business resilience, some crises can’t be anticipated. […]

Posted in Cyber Security News | Comments Off on Three Rules of Crisis Management: Lessons from the War in Israel

Cyber resilience: Safeguarding your enterprise in a rapidly changing world

By Srinivasan CR, Executive Vice President-Cloud and Cybersecurity Services & Chief Digital Officer, Tata Communications In a hyperconnected world, cyberattacks are increasingly common. Just ransomware activity alone was up 50% […]

Posted in Cyber Security News | Comments Off on Cyber resilience: Safeguarding your enterprise in a rapidly changing world

Rise of the Cyber Supervillain

By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction about the rise of the Cyber Supervillain. This is an […]

Posted in Cyber Security News | Comments Off on Rise of the Cyber Supervillain

The Next Generation of Endpoint Security Is Being Reimagined Today

By Vivek Ramachandran, CEO & Founder, SquareX Gone are the days when traditional antivirus solutions were the bulwark of endpoint security. In the past, these antivirus programs were largely sufficient, […]

Posted in Cyber Security News | Comments Off on The Next Generation of Endpoint Security Is Being Reimagined Today

The Importance of Data Categorization In A Threat-Filled Landscape

By Dr. Pragyansmita Nayak, Chief Data Scientist, Hitachi Vantara Federal National security is amid a transformative journey driven by technological progress in more ways than one. One of those ways […]

Posted in Cyber Security News | Comments Off on The Importance of Data Categorization In A Threat-Filled Landscape

Spike in Layoffs Pose Serious Cybersecurity Concerns

Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There has been a spike in layoffs over the last few […]

Posted in Cyber Security News | Comments Off on Spike in Layoffs Pose Serious Cybersecurity Concerns

Red Sea Crisis and the Risk of Cyber Fallout

By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a political sponsor of Israel is contending with regional provocations by […]

Posted in Cyber Security News, Featured | Comments Off on Red Sea Crisis and the Risk of Cyber Fallout

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X