Zero Trust Remote Access for Engineering Teams
By Colin Rand, VP of Engineering, Banyan Security Engineering organizations present numerous challenges for security programs when it comes to remote access. They need secure access to dynamic hosts, services, […]
Businesses Must Protect Their Most Critical Asset: Their Data
By Trevor J. Morgan, Ph.D., Product Manager at comforte AG Protecting sensitive data is a challenge facing every business and enterprise. The value of data is rising to the extent […]
Securing Digital Identities in A Predominantly Remote World
COVID-19 and the subsequent uptick in targeted cyberattacks accelerate the need for biometric-based digital onboarding By Bob Eckel, President & CEO, Aware, Inc. As we entered 2020, organizations were beginning […]
5 AIOps Trends That Will Shape 2021
By Tej Redkar, Chief Product Officer at LogicMonitor If 2020 has taught us anything, it is that life is nothing if not unpredictable. Yet, the unforeseen possibilities of tomorrow are […]
3 Email Hacking Techniques to Watch In 2021
By Adrien Gendre, Chief Product & Services Officer, Vade Secure Ransomware hobbled businesses in 2020, while COVID-19 spawned an endless stream of cyberattacks. What both have in common is email. […]
The Future of Security Is on The Hardware
The Virtualization Revolution Removes Security Onus From Users by Leveraging New Hardware-Powered Approach By Ian Pratt, Global Head of Security, HP Today’s threat landscape is constantly evolving, and the COVID-19 […]
Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Emotet campaign hits Lithuania’s National Public Health Center and several state institutions
An Emotet campaign hit Lithuania, the malware has infected systems at the National Center for Public Health (NVSC) and several municipalities. A large-scale Emotet campaign hit Lithuania, the malware has […]
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!). By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
To Share, Or Not to Share
As consumers’ views on personal data evolve, it’s time to re-think data privacy By Kris Lovejoy, Global Consulting Cybersecurity Leader, EY Today organizations are standing at a crossroads when it […]
How We Securely Share Data in A Remote World
By Duncan Greatwood, CEO, Xage Security Cybersecurity solutions are often thought of as a single-issue solution: protecting companies from dangerous or costly hacks, or detecting hacks after they’ve already happened, […]
A Hybrid Workplace Means New Threats and More Pressure on IT Leaders
By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]
Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps
By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the […]
2021 Predictions on Defeating Cybercriminals
by Gary S. Miliefsky, Publisher, Author, Investor and Keynote Speaker Here we are and most of us are thankful that 2020 is almost behind us, since the global panic has […]
Making the Journey to the Intelligent SOC
AI, Machine Learning, and Open-XDR Make it Easier By Albert Zhichun Li, Chief Scientist, Stellar Cyber Most enterprises and service providers are building security operations centers (SOCs) where a team […]
What’s in Your Wallet? The Cybersecurity Costs of COVID
With new business challenges in play, organizations are shifting their cybersecurity spend accordingly By Mark Sangster, Vice President, and Industry Security Strategist, eSentire If anything has become clear over the […]
Amidst Election Noise, Cybercriminals See an Opportunity with Retail
By Chris Kennedy, CISO & VP of Customer Success, AttackIQ More than seven months into the onset of the novel coronavirus, it feels strange to look back on the things […]
The Coming Security Perspectives
By Milica D. Djekic It appears that today’s world landscape is under constant and chronical attack of security challenges. There is no time in history that was easy and it’s […]
All Aboard The COVID-19 Train: Malware Trends Taking Advantage of The Pandemic
By Bar Block, Threat Intelligence Researcher at Deep Instinct Since the outbreak of COVID-19, plenty of COVID-19 themed malware attacks have surfaced around the globe. Attackers take every chance they […]
Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications
By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]
The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year
By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to […]
PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs
Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner. Security researchers from Palo Alto Networks have discovered a new […]
Data Migration Security
What to Know By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
PyMICROPSIA Windows malware includes checks for Linux and macOS
Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms. Experts from Palo Alto Networks’s Unit 42 discovered a new […]
Why the Education Sector Must Address Security in The Rush to Digitise
By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]
US Agencies and FireEye were hacked with a supply chain attack on SolarWinds Software
Hackers broke into the networks of federal agencies and FireEye by compromising SolarWinds’ Orion Network Management Products. The cyber espionage group has tampered with updates released by IT company SolarWinds, […]
Anatomy of a hack – Solar Winds Orion
Nation State hacks major IS Software vender by James Gorman, CISO, Authx SolarWinds is one of the biggest names in IT support – and now one of the most notorious. […]
Revealed: How Banking and Finance GRC Leaders Struggle to Address Regulators’ Demands for Cyber Evidence with Confidence
By Charaka Goonatilake. CTO at Panaseer It’s one thing to keep data secure and assets protected, but another thing entirely to have the evidence at hand to prove your security […]