DevSecOps and Digital Transformation: Bridging the Security Gap

How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […]

Posted in Cyber Security News | Comments Off on DevSecOps and Digital Transformation: Bridging the Security Gap

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture

By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face increasing cyberattack threats. Instead of fearing the unknown, business owners […]

Posted in Cyber Security News, Featured | Comments Off on As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture

Why Defensive Superiority Should Rein Over Offensive Capability

By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations and institutions in both the private and public sectors must […]

Posted in Cyber Security News, Featured | Comments Off on Why Defensive Superiority Should Rein Over Offensive Capability

Compliance Is the Key to Unlocking Government Contractor Success

By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order 14028 into law, establishing new security standards for software that the government […]

Posted in Cyber Security News, Featured | Comments Off on Compliance Is the Key to Unlocking Government Contractor Success

Applying the NIST Framework to Ransomware Risk Management

Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP and Chief Architect, Semperis Your organization likely adheres to at least some […]

Posted in Cyber Security News, Featured | Comments Off on Applying the NIST Framework to Ransomware Risk Management

Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?

By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, your home is under attack, 24 hours a day. By the time […]

Posted in Cyber Security News | Comments Off on Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?

Cyber Threats Driving Insurance Claims Activity

By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz Global Corporate & Specialty (AGCS) Cyber Threats Driving Insurance Claims Activity  In […]

Posted in Cyber Security News | Comments Off on Cyber Threats Driving Insurance Claims Activity

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention

By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from how it is viewed today. As enterprise companies started taking on the […]

Posted in Cyber Security News | Comments Off on Common Vulnerabilities of Enterprise Web Security That Demands Your Attention

Automated Patch Management Can Protect Your Business from A Data Disaster

By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can see. For example, the aviation industry prohibits guns or knives on planes […]

Posted in Cyber Security News | Comments Off on Automated Patch Management Can Protect Your Business from A Data Disaster

AI Is the Answer To Modern Cybersecurity Threats

Why embracing AI solutions is key to combatting evolving cyber threats across many sectors. By Ralph Chammah, CEO, OwlGaze With cyber threats becoming increasingly diverse in how they strategically cripple […]

Posted in Cyber Security News | Comments Off on AI Is the Answer To Modern Cybersecurity Threats

What is a mobile possession factor – and how can it replace passwords to stop phishing?

By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – which means we are all vulnerable to phishing attacks. The frequency and […]

Posted in Cyber Security News, Featured | Comments Off on What is a mobile possession factor – and how can it replace passwords to stop phishing?

5 Ways to Protect Your Workplace from Cybersecurity Threats

By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and hackers to exploit data security flaws. […]

Posted in Cyber Security News | Comments Off on 5 Ways to Protect Your Workplace from Cybersecurity Threats

Data, Privacy, And the Future of Artificial Intelligence

By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become both central and increasingly restrictive for businesses in the United States and […]

Posted in Cyber Security News | Comments Off on Data, Privacy, And the Future of Artificial Intelligence

Zero Trust is More Than a Buzzword

Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO and Imperva Fellow, Imperva A bank wouldn’t implicitly trust any individual who […]

Posted in Cyber Security News | Comments Off on Zero Trust is More Than a Buzzword

Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It

By Nick Merritt, Vice President of Security Products and Services, Halo Security Business leaders are confronted with headlines every day that detail how sophisticated hackers have become. Their methods are […]

Posted in Cyber Security News | Comments Off on Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It

WordPress Security Explained – Reduce the Risk of Being Hacked by 82%

In 2022, the WordPress is still #1 fastest growing website platform and the best content management system currently available.  Approximately 42% of all websites online are based on WordPress.  Fortune […]

Posted in Cyber Security News | Comments Off on WordPress Security Explained – Reduce the Risk of Being Hacked by 82%

Understanding Identity Detection and Response

Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might […]

Posted in Cyber Security News | Comments Off on Understanding Identity Detection and Response

What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are a common threat that enable hackers to steal massive amounts […]

Posted in Cyber Security News | Comments Off on What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

Shifting Focus of Cloud from Infra Solution to Business Strategy

India Cloud Day; a debrief by Jaison Augustin, Director, NetNex Global Private Limited NetNex Global just drew the curtains on their debut edition of India Cloud Day 2021 to an […]

Posted in Cyber Security News | Comments Off on Shifting Focus of Cloud from Infra Solution to Business Strategy

Attivo Networks – One Year Later

Dr. Peter Stephenson It’s been a bit over a year since I published my review of Attivo BOTSink and today the company’s product suite does not look at all the […]

Posted in Cyber Security News, Featured | Comments Off on Attivo Networks – One Year Later

Discovering Unknown Botnets with Command-and-Control Communications Analysis

Byline: Howie Xu Cloud-edge-based proxy security services like the Zscaler Zero Trust Exchange rely on Machine Learning models to detect, identify, and block malicious traffic. Zscaler (my employer) processes more […]

Posted in Cyber Security News | Comments Off on Discovering Unknown Botnets with Command-and-Control Communications Analysis

How to Protect Your Corporate Brand and Reputation in the Digital Age (No Fee) Virtual Seminar

Click Here Register Now A trusted brand reputation is the product of relentless hard work and passionate devotion. Its importance can not be overstated—it builds company loyalty, develops a strong […]

Posted in Cyber Security News | Comments Off on How to Protect Your Corporate Brand and Reputation in the Digital Age (No Fee) Virtual Seminar

Combating Evolved Cyber Threats Starts With Knowing Where You Stand

by Rob Simopoulos, Co-Founder, Defendify IT professionals are entrusted to recommend methods to help strengthen overall data protection. But for many, it might be difficult to lead the charge toward […]

Posted in Cyber Security News | Comments Off on Combating Evolved Cyber Threats Starts With Knowing Where You Stand

ANALYSIS: Intelligent Next Generation Security Operations Platform – Stellar Cyber

I’ll begin by making a bold statement: Stellar Cyber is a beast. For you who may be thinking, “he’s about to demolish this product”, I’m sorry to disappoint you. Today’s […]

Posted in Cyber Security News, Featured | Comments Off on ANALYSIS: Intelligent Next Generation Security Operations Platform – Stellar Cyber

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X