DevSecOps and Digital Transformation: Bridging the Security Gap
How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […]
As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture
By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face increasing cyberattack threats. Instead of fearing the unknown, business owners […]
Why Defensive Superiority Should Rein Over Offensive Capability
By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations and institutions in both the private and public sectors must […]
Compliance Is the Key to Unlocking Government Contractor Success
By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order 14028 into law, establishing new security standards for software that the government […]
Applying the NIST Framework to Ransomware Risk Management
Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP and Chief Architect, Semperis Your organization likely adheres to at least some […]
Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?
By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, your home is under attack, 24 hours a day. By the time […]
Cyber Threats Driving Insurance Claims Activity
By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz Global Corporate & Specialty (AGCS) Cyber Threats Driving Insurance Claims Activity In […]
Common Vulnerabilities of Enterprise Web Security That Demands Your Attention
By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from how it is viewed today. As enterprise companies started taking on the […]
Automated Patch Management Can Protect Your Business from A Data Disaster
By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can see. For example, the aviation industry prohibits guns or knives on planes […]
AI Is the Answer To Modern Cybersecurity Threats
Why embracing AI solutions is key to combatting evolving cyber threats across many sectors. By Ralph Chammah, CEO, OwlGaze With cyber threats becoming increasingly diverse in how they strategically cripple […]
What is a mobile possession factor – and how can it replace passwords to stop phishing?
By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – which means we are all vulnerable to phishing attacks. The frequency and […]
5 Ways to Protect Your Workplace from Cybersecurity Threats
By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and hackers to exploit data security flaws. […]
Data, Privacy, And the Future of Artificial Intelligence
By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become both central and increasingly restrictive for businesses in the United States and […]
Zero Trust is More Than a Buzzword
Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO and Imperva Fellow, Imperva A bank wouldn’t implicitly trust any individual who […]
Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It
By Nick Merritt, Vice President of Security Products and Services, Halo Security Business leaders are confronted with headlines every day that detail how sophisticated hackers have become. Their methods are […]
WordPress Security Explained – Reduce the Risk of Being Hacked by 82%
In 2022, the WordPress is still #1 fastest growing website platform and the best content management system currently available. Approximately 42% of all websites online are based on WordPress. Fortune […]
Understanding Identity Detection and Response
Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might […]
What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?
Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are a common threat that enable hackers to steal massive amounts […]
Shifting Focus of Cloud from Infra Solution to Business Strategy
India Cloud Day; a debrief by Jaison Augustin, Director, NetNex Global Private Limited NetNex Global just drew the curtains on their debut edition of India Cloud Day 2021 to an […]
Attivo Networks – One Year Later
Dr. Peter Stephenson It’s been a bit over a year since I published my review of Attivo BOTSink and today the company’s product suite does not look at all the […]
Discovering Unknown Botnets with Command-and-Control Communications Analysis
Byline: Howie Xu Cloud-edge-based proxy security services like the Zscaler Zero Trust Exchange rely on Machine Learning models to detect, identify, and block malicious traffic. Zscaler (my employer) processes more […]
How to Protect Your Corporate Brand and Reputation in the Digital Age (No Fee) Virtual Seminar
Click Here Register Now A trusted brand reputation is the product of relentless hard work and passionate devotion. Its importance can not be overstated—it builds company loyalty, develops a strong […]
Combating Evolved Cyber Threats Starts With Knowing Where You Stand
by Rob Simopoulos, Co-Founder, Defendify IT professionals are entrusted to recommend methods to help strengthen overall data protection. But for many, it might be difficult to lead the charge toward […]
Businesses Should See Security as An Enabler of Digital Transformation, Not A Hindrance
A distributed workforce has renewed the importance of security for all aspects of organizations’ technology estates By Matt Gyde, CEO, Security Division at NTT Ltd. The pandemic has put a […]
ANALYSIS: Intelligent Next Generation Security Operations Platform – Stellar Cyber
I’ll begin by making a bold statement: Stellar Cyber is a beast. For you who may be thinking, “he’s about to demolish this product”, I’m sorry to disappoint you. Today’s […]
Cybersecurity Maturity Model Certification (CMMC)
It is not about compliance, or is it? By Carter Schoenberg, CISSP & CMMC Registered Practitioner Vice President – Cybersecurity SoundWay Consulting, Inc. As of the date of this publication, […]
Anatomy of a hack – Solar Winds Orion
Nation-State hacks major IS Software vender By James Gorman, CISO, Authx What happened when one of the leading IT to support vendors in the world, leading government agencies the world […]
Communication Streaming Challenges
By Milica D. Djekic As it’s well-known, there are a lot of ways of tracking someone’s e-mail, chat, or social media accounts. The defense professionals are quite familiar with such […]
E-Commerce and Lockdown: The Perfect Storm for Cyber Threats
The impact of lockdowns on cybersecurity By Aman Johal, Lawyer and Director of Your Lawyers The UK’s National Cyber Security Centre (NCSC) reported that a quarter of all cyberattacks over […]
Cryptocurrency Ransomware Is on The Rise During COVID-19 – Here’s What Businesses of All Sizes Need to Know About Dealing with Attacks
By Marc Grens, Co-Founder & President at DigitalMint Crypto-related ransomware attacks are on the rise, and the pandemic has only hastened its propagation. For example, from 2018 to 2020, ransomware […]