Pay2Key hackers stole data from Intel’s Habana Labs

Pay2Key ransomware operators claim to have compromised the network of the Intel-owned chipmaker Habana Labs and have stolen data. ​Intel-owned AI chipmaker Habana Labs was hacked by Pay2key ransomware operators […]

Posted in Cyber Security News | Comments Off on Pay2Key hackers stole data from Intel’s Habana Labs

Cybersecurity: Innovation Needed

Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cybersecurity: Innovation Needed

Learning Hardware Security Via Capture-The-Flag Competitions

By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Learning Hardware Security Via Capture-The-Flag Competitions

Reflecting on 2020: Cybersecurity Black Unicorns of The Year

As we begin to wind-down 2020, we would like you to make sure you did not miss our annual Black Unicorn Report.  You’ll see some of the most innovative and […]

Posted in Cyber Security News, Featured | Comments Off on Reflecting on 2020: Cybersecurity Black Unicorns of The Year

Why Organizations Need to Reduce Friction to Manage Remote Work Environments

The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Why Organizations Need to Reduce Friction to Manage Remote Work Environments

Six Reasons to Review Your Identity and Access Management Strategy

Articles and blogs about Identity and Access Management (IAM) can be found on just about any technology-related website. Many articles point out the benefits of the myriad tools and products […]

Posted in Cyber Security News, Featured | Comments Off on Six Reasons to Review Your Identity and Access Management Strategy

For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge

By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge

Patched Minimizes Risk – But Opens the Door for Compatibility Problems

How to Remediate Federal Systems with Zerologon Vulnerability By Egon Rinderer, Global Vice President of Technology & Federal CTO, Tanium In September, the Cybersecurity and Infrastructure Security Agency (CISA) released […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Patched Minimizes Risk – But Opens the Door for Compatibility Problems

Magecart May Make Holidays Less Merry

Third-party plug-ins driving most retail sites can open doors to attackers by Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks In the unprecedented year of 2020, the rise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Magecart May Make Holidays Less Merry

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

Readiness and Risk Exposure in the New Normal

By Cyber Defense Magazine News Staff A recent report conducted by Osterman Research and sponsored by TrapX Security­[1] provides valuable insights on the problems facing cybersecurity professionals in protecting their […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Readiness and Risk Exposure in the New Normal

Nations Not Individuals Are After Your Intellectual Property (IP)

by Ryan Benner, Vice President of Presales,  Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian […]

Posted in Cyber Security News, Featured | Comments Off on Nations Not Individuals Are After Your Intellectual Property (IP)

How to Keep Your Children Safe in Remote Learning Situations

By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , , , , , , , , | Comments Off on How to Keep Your Children Safe in Remote Learning Situations

Office 365 phishing campaign leverages Oracle and Amazon cloud services

Experts warn of a new sophisticated phishing scheme for stealing Office 365 credentials from small and medium-sized businesses in the U.S. The new sophisticated phishing scheme was implemented by threat […]

Posted in Cyber Security News | Comments Off on Office 365 phishing campaign leverages Oracle and Amazon cloud services

A critical flaw in industrial automation systems opens to remote hack

Experts found a critical flaw in Real-Time Automation’s (RTA) 499ES EtherNet/IP stack that could allow hacking industrial control systems. Tracked as CVE-2020-25159, the flaw is rated 9.8 out of 10 in […]

Posted in Cyber Security News | Comments Off on A critical flaw in industrial automation systems opens to remote hack

Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

Unlocking the Promise of Packet Capture

By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Unlocking the Promise of Packet Capture

The Serverless Security Machine

By Art  Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Serverless Security Machine

Cybersecurity Best Practices for End Users

By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Cybersecurity Best Practices for End Users

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Halting Hackers on the Holidays

Expert tips for keeping your information safe while you shop online Commentary As we approach major holidays, with Black Friday and Cyber Monday right around the corner and a massive increase in […]

Posted in Cyber Security News | Comments Off on Halting Hackers on the Holidays

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X