Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program

Posted in Cyber Security News, Featured | Comments Off on Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program

An Interview With Jeffrey Stephens

🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻 Unravel the gripping tale of Nick Reagan’s pursuit of “Enemies […]

Posted in Cyber Security News | Comments Off on An Interview With Jeffrey Stephens

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game

If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […]

Posted in Cyber Security News, Featured | Comments Off on Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game

Keeping SaaS Data Under Wraps

By Hananel Livneh, Head of Product Marketing at Adaptive Shield A Case Study on How a $10B Global Media Firm Significantly Improved SaaS Security Posture Media firms in the business […]

Posted in Cyber Security News, Featured | Comments Off on Keeping SaaS Data Under Wraps

Your #1 Security Initiative in 2024 Should be Operational Resilience

By David Ratner, CEO of HYAS The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As boards, CEOs, and security […]

Posted in Cyber Security News, Featured | Comments Off on Your #1 Security Initiative in 2024 Should be Operational Resilience

IP network security in the age of DDoS and quantum computing

By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […]

Posted in Cyber Security News | Comments Off on IP network security in the age of DDoS and quantum computing

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […]

Posted in Cyber Security News | Comments Off on Institutionalizing Awareness to Stop Cyberattacks

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […]

Posted in Cyber Security News | Comments Off on 6 Steps to Accelerate Cybersecurity Incident Response

Seeing Through the Vendor Spin: Interpreting the MITRE ATT&CK Evaluation Results

The 2023 MITRE ATT&CK Enterprise Evaluation results were just released and that means one thing – all participating vendors are scrambling to show themselves in the best light possible. This, […]

Posted in Cyber Security News | Comments Off on Seeing Through the Vendor Spin: Interpreting the MITRE ATT&CK Evaluation Results

Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries

by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s business hall. They featured over 440 of the industry’s leading […]

Posted in Cyber Security News | Comments Off on Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is […]

Posted in Cyber Security News, Featured | Comments Off on How to interpret the 2023 MITRE ATT&CK Evaluation results

An Interview with Dasha Deckwerth – Stealth ISS Group

Posted in Cyber Security News | Comments Off on An Interview with Dasha Deckwerth – Stealth ISS Group

Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure

Posted in Cyber Security News | Comments Off on Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure

Mastering Patch Management: 10 Essential Best Practices for Optimal Security

What is patch management and why is it important? Software development is a continuous process, whether it involves creating a Windows Server or a simple text editor. Vendors release functional […]

Posted in Cyber Security News | Comments Off on Mastering Patch Management: 10 Essential Best Practices for Optimal Security

ImmuniWeb AI Platform

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […]

Posted in Cyber Security News, Featured | Comments Off on ImmuniWeb AI Platform

Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change

by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its intended job, giving a false sense of security, and causing […]

Posted in Cyber Security News, Featured | Comments Off on Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change

Top 100 Women in Cybersecurity

Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai https://www.linkedin.com/in/hong-jia-02234654/ Assurant Marilyn Piccolo https://www.linkedin.com/in/marilyn-piccolo-777a728/ Attivo Networks Sarah […]

Posted in Top 100 | Comments Off on Top 100 Women in Cybersecurity

Top 100 CISOs

  These CISOs competed against thousands of candidates for this prestigious award.  Judges look at these candidates, searching for the most innovative, with unparalleled success in communicating with their boards […]

Posted in Top 100 | Comments Off on Top 100 CISOs

Top 100 Cybersecurity Startups

  10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/ Axis Security https://www.axissecurity.com/ Axonius https://www.axonius.com/ Axur https://axur.com/ Balbix https://www.balbix.com/ Black […]

Posted in Top 100 | Comments Off on Top 100 Cybersecurity Startups

Moola Market Manipulation

Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered […]

Posted in Cyber Security News | Comments Off on Moola Market Manipulation

Managing Cybersecurity for Critical National Infrastructure

General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality of managing a cybersecurity program […]

Posted in Cyber Security News | Comments Off on Managing Cybersecurity for Critical National Infrastructure

Remote Workers Face Growing Threats from Phishing Attacks

Analysis Shows Phishing Strikes Up 61% Over 2021,  With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies have reorganized the workplace forever, […]

Posted in Cyber Security News | Comments Off on Remote Workers Face Growing Threats from Phishing Attacks

Infrastructure-as-Code Security: a Critical Responsibility

By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been established for over half a […]

Posted in Cyber Security News | Comments Off on Infrastructure-as-Code Security: a Critical Responsibility

Mobile App APIs Are Crucial to Businesses – But Are Under-Protected

The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources Being Allocated to Runtime App and Data Protection. By David […]

Posted in Cyber Security News, Featured | Comments Off on Mobile App APIs Are Crucial to Businesses – But Are Under-Protected

How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce

By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a rainy day. But as breaches become commonplace, insurers are running […]

Posted in Cyber Security News, Featured | Comments Off on How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce

How Does a Botnet Attack Work?

By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity analysts must consider botnet attacks among classic ransomware and […]

Posted in Cyber Security News | Comments Off on How Does a Botnet Attack Work?

How 5G Networks Are Secured and Enabled By SASE

By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment and security considerations. While still […]

Posted in Cyber Security News | Comments Off on How 5G Networks Are Secured and Enabled By SASE

The Rise in Cyber-Attacks from Bad International Actors

There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By Scott Bledsoe, CEO, Theon Technology […]

Posted in Cyber Security News | Comments Off on The Rise in Cyber-Attacks from Bad International Actors

Five Ways to Keep Endpoint Protection Simple

By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve. In fact, research shows that 68% of organizations have experienced […]

Posted in Cyber Security News | Comments Off on Five Ways to Keep Endpoint Protection Simple

Doenerium: When Stealing from Thieves Is Also a Crime

By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat experts uncovered a particularly worrying and sophisticated phishing attack that […]

Posted in Cyber Security News | Comments Off on Doenerium: When Stealing from Thieves Is Also a Crime

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X