AI is Revolutionizing Phishing for Both Sides. What will make the Difference?

Thanks to AI, phishing attacks are better than ever. So is our ability to stop them. By Antonio Sanchez, Principal Cybersecurity Evangelist at Fortra AI has always been a lurking […]

Posted in Cyber Security News | Comments Off on AI is Revolutionizing Phishing for Both Sides. What will make the Difference?

Crafting AI’s Future: Decoding the AI Executive Order

By: Rajat Kohli, Partner at Zinnov There is something to be learned from epic fantasy productions like Harry Potter. That every few years, there will be a gifted wizard who […]

Posted in Cyber Security News | Comments Off on Crafting AI’s Future: Decoding the AI Executive Order

Connecting Tech to Black America

By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem inaccessible and intimidating for the everyday person. For Black Americans […]

Posted in Cyber Security News | Comments Off on Connecting Tech to Black America

The Importance of Cyber Hygiene for Businesses

By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3 trillion worldwide by 2025, and it’s growing fast. It’s a […]

Posted in Cyber Security News | Comments Off on The Importance of Cyber Hygiene for Businesses

5 Cybersecurity Resolutions for the New Year

By Roger Spears, Schneider Downs Whenever the new year rolls around, resolutions—to achieve a goal, improve a behavior or continue good practices—abound. And, while many resolutions center personal goals such […]

Posted in Cyber Security News | Comments Off on 5 Cybersecurity Resolutions for the New Year

Hybrid Working is Changing How We Think About Security

By Prakash Mana, CEO, Cloudbrink Security will continue to head the list of priorities for CISOs in 2024, but how we secure our enterprises will need rethinking in the face […]

Posted in Cyber Security News | Comments Off on Hybrid Working is Changing How We Think About Security

When Security Collides with Customer Impatience

How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […]

Posted in Cyber Security News | Comments Off on When Security Collides with Customer Impatience

DevSecOps Practices for a Secure Cloud

How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […]

Posted in Cyber Security News | Comments Off on DevSecOps Practices for a Secure Cloud

Vendors Beware of the Cybersecurity Audit

By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […]

Posted in Cyber Security News | Comments Off on Vendors Beware of the Cybersecurity Audit

How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance

And What We Can Learn From It By Brian Hesse, Co-Owner, President, and Chief Executive Officer of PerenniAL Summary Cybersecurity professionals, as with virtually every other organizational function, are always […]

Posted in Cyber Security News | Comments Off on How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance

ImmuniWeb AI Platform

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […]

Posted in Cyber Security News, Featured | Comments Off on ImmuniWeb AI Platform

SIEM vs XDR: Capabilities and Key Differences

We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […]

Posted in Cyber Security News, Featured | Comments Off on SIEM vs XDR: Capabilities and Key Differences

Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do

By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause significant damage to any organization, big or small. Higher education institutions are especially vulnerable, […]

Posted in Cyber Security News | Comments Off on Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do

Why Companies Are Still Investing in Tech During an Economic Slowdown

By Luke Wallace, VP of Engineering at Bottle Rocket With rising oil prices, higher interest rates, and an economic downturn plaguing Europe and China throughout 2023, recession is looming in […]

Posted in Cyber Security News | Comments Off on Why Companies Are Still Investing in Tech During an Economic Slowdown

Ditch the Worry – Switch to Secure WhatsApp Alternative

By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […]

Posted in Cyber Security News, Featured | Comments Off on Ditch the Worry – Switch to Secure WhatsApp Alternative

The Role of Endpoint Security and Management In Threat Detection

By Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches originate at the endpoint (servers, desktops, laptops, mobile devices and IoT devices). These […]

Posted in Cyber Security News, Featured | Comments Off on The Role of Endpoint Security and Management In Threat Detection

You Can’t Prevent Every Attack, But You Can Mitigate the Damage

More than ever, attackers are leveraging compromised identities to carry out cyberattacks. Stopping them is a challenge—but limiting their impact doesn’t have to be. By Grady Summers, Executive Vice President […]

Posted in Cyber Security News, Featured | Comments Off on You Can’t Prevent Every Attack, But You Can Mitigate the Damage

From Edge to Core: Security in the Data Center

By Timothy Liu, CTO and Co-Founder, Hillstone Networks Most organizations recognize the data center as the most essential and critical element of the network. After all, it serves as the […]

Posted in Cyber Security News, Featured | Comments Off on From Edge to Core: Security in the Data Center

The Role of Compliance in Cybersecurity

Cybersecurity compliance is essential as it contributes to cyberspace safety in meaningful ways By Anas Baig, Product Manager, Securiti Cybersecurity is a complicated yet essential system – one that needs […]

Posted in Cyber Security News, Featured | Comments Off on The Role of Compliance in Cybersecurity

For Cybercriminals, the Game is On and They’re Playing to Win

Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom Software Our fascination — and for many, obsession — with sports in […]

Posted in Cyber Security News, Featured | Comments Off on For Cybercriminals, the Game is On and They’re Playing to Win

The Rise of Crypto Regulations

How to Comply Now, and for the Future By Ben Richmond, CEO and Founder of CUBE Global As cryptocurrency is gradually explored as a mainstream option for payments – with […]

Posted in Cyber Security News, Featured | Comments Off on The Rise of Crypto Regulations

The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022

By Greg Notch, CISO, Expel The list of challenges security professionals face will not let up, as new threats emerge on a weekly—even daily—basis. Security teams need to stay informed […]

Posted in Cyber Security News, Featured | Comments Off on The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022

Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them

By Tammy Mindel, Security Product Manager at Semperis Microsoft Active Directory (AD) has become a highly lucrative target for cyberattackers. That’s no surprise, given the prevalence of the identity service […]

Posted in Cyber Security News, Featured | Comments Off on Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them

Why Cybersecurity Is Critical for ESG

Cyber-Awareness Can Help Companies Meet Esg Obligations By Shaun McAlmont, CEO, NINJIO One of the most important trends in the private sector—primarily among publicly traded companies, but increasingly among small […]

Posted in Cyber Security News, Featured | Comments Off on Why Cybersecurity Is Critical for ESG

The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity

An Outline of the Importance of Proper E-Waste Disposal for Enterprise Best Practices in terms of both CSR and Cybersecurity By Milica Vojnic, Senior Digital Marketing Executive, Wisetek E-waste is […]

Posted in Cyber Security News, Featured | Comments Off on The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity

Web3, Good Hygiene, and the Need for End-to-End Security

By Professor Ronghui Gu, CEO, CertiK Having a smart contract audit is a lot like washing your hands– do it only once, and be prepared for the consequences. As the […]

Posted in Cyber Security News, Featured | Comments Off on Web3, Good Hygiene, and the Need for End-to-End Security

Zero-Trust Needs to be a Priority – For SaaS, Too

By Misha Seltzer, Co-Founder and CTO of Atmosec Call it a sign of the times; you can’t trust anyone these days, even the most loyal members of your organization. As […]

Posted in Cyber Security News, Featured | Comments Off on Zero-Trust Needs to be a Priority – For SaaS, Too

The Growing Importance of VPNs

By Izzy Murphy, Reporter for TechRound There are many advantages which come from using a VPN, such as being able to bypass geo-blockers, access information or data remotely and above […]

Posted in Cyber Security News, Featured | Comments Off on The Growing Importance of VPNs

The Future of Attack Surface Management: How to Prepare

By David Monnier, Team Cymru Fellow To stay ahead of threat actors, organizations must monitor their attack surfaces continuously, maintain accurate and updated asset inventories, and judge which vulnerabilities to […]

Posted in Cyber Security News, Featured | Comments Off on The Future of Attack Surface Management: How to Prepare

The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability

By Neil Ellis, CIO and CISO at CafeX Communications Disparate Solutions Are Costing Your Organization Breaches from the past year have made clear that current approaches to Cyber Incident Management […]

Posted in Cyber Security News, Featured | Comments Off on The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X