You Can’t Prevent Every Attack, But You Can Mitigate the Damage
More than ever, attackers are leveraging compromised identities to carry out cyberattacks. Stopping them is a challenge—but limiting their impact doesn’t have to be. By Grady Summers, Executive Vice President […]
From Edge to Core: Security in the Data Center
By Timothy Liu, CTO and Co-Founder, Hillstone Networks Most organizations recognize the data center as the most essential and critical element of the network. After all, it serves as the […]
The Role of Compliance in Cybersecurity
Cybersecurity compliance is essential as it contributes to cyberspace safety in meaningful ways By Anas Baig, Product Manager, Securiti Cybersecurity is a complicated yet essential system – one that needs […]
For Cybercriminals, the Game is On and They’re Playing to Win
Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom Software Our fascination — and for many, obsession — with sports in […]
The Rise of Crypto Regulations
How to Comply Now, and for the Future By Ben Richmond, CEO and Founder of CUBE Global As cryptocurrency is gradually explored as a mainstream option for payments – with […]
The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022
By Greg Notch, CISO, Expel The list of challenges security professionals face will not let up, as new threats emerge on a weekly—even daily—basis. Security teams need to stay informed […]
Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them
By Tammy Mindel, Security Product Manager at Semperis Microsoft Active Directory (AD) has become a highly lucrative target for cyberattackers. That’s no surprise, given the prevalence of the identity service […]
Why Cybersecurity Is Critical for ESG
Cyber-Awareness Can Help Companies Meet Esg Obligations By Shaun McAlmont, CEO, NINJIO One of the most important trends in the private sector—primarily among publicly traded companies, but increasingly among small […]
The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity
An Outline of the Importance of Proper E-Waste Disposal for Enterprise Best Practices in terms of both CSR and Cybersecurity By Milica Vojnic, Senior Digital Marketing Executive, Wisetek E-waste is […]
Web3, Good Hygiene, and the Need for End-to-End Security
By Professor Ronghui Gu, CEO, CertiK Having a smart contract audit is a lot like washing your hands– do it only once, and be prepared for the consequences. As the […]
Zero-Trust Needs to be a Priority – For SaaS, Too
By Misha Seltzer, Co-Founder and CTO of Atmosec Call it a sign of the times; you can’t trust anyone these days, even the most loyal members of your organization. As […]
The Growing Importance of VPNs
By Izzy Murphy, Reporter for TechRound There are many advantages which come from using a VPN, such as being able to bypass geo-blockers, access information or data remotely and above […]
The Future of Attack Surface Management: How to Prepare
By David Monnier, Team Cymru Fellow To stay ahead of threat actors, organizations must monitor their attack surfaces continuously, maintain accurate and updated asset inventories, and judge which vulnerabilities to […]
The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability
By Neil Ellis, CIO and CISO at CafeX Communications Disparate Solutions Are Costing Your Organization Breaches from the past year have made clear that current approaches to Cyber Incident Management […]
The Balance of Power: One Disturbance Could Ignite The First Cyber World War
By Guy Golan, Founder and CEO of Performanta The Russian invasion of Ukraine has led to the awful re-emergence of war on the European continent. This time round however, we’ve […]
The Artificial Intelligence Tug-of-War: Adversaries vs. Defenders
By Corey Nachreiner, CSO at WatchGuard Technologies Artificial intelligence (AI) is playing an increasingly important role in cybersecurity. A recent Pulse Survey shows that 68% of senior executives say they are […]
The 6 Biggest Financial Sector Cybersecurity Threats in 2022
By Veniamin Semionov, Director of Product Management, NAKIVO The financial sector cybersecurity is always a concern because this industry branch is among the top targets for cyberattacks. And this is […]
Software-Defined Radio for Incident Response
By Brendon McHugh, FAE & Technical Writer, Per Vices Wireless technology has become ubiquitous in people’s lives and will continue to expand with Industry 4.0, smart cities, smart grids, and […]
VIP3R: Dissecting A New Venomous Spearphishing Campaign
By Tom McVey, Solution Architect at Menlo Security Social engineering attacks are among the most prevalent and dangerous threats facing organizations globally today. One study shows that 83% of organizations […]
Smart IoT Security Starts with a Secure Network
How to safeguard your IoT implementation to reap the benefits without the risk. By Matthew Margetts, Sales & Marketing Director, Smarter Technologies From mobile phones to smart grids and supply […]
Scared Of Your Own Shadow IT? Addressing The Top Security Concern Around SaaS Adoption
By Uri Haramati, Co-Founder and CEO of Torii The pandemic struck, and organizations were forced to embrace remote work and cloud applications. Software-as-a-Service (SaaS) apps like Zoom and Slack kept […]
Russia’s Invasion of Ukraine Lays Ground for a New Era of Cyberwarfare
Russia is known to be the world’s leading hacking superpower for a reason. The country has an infamous history of executing high impact cyberattacks, often aimed at one of the […]
Raising the Alarm on DDoS Attacks
By Ivan Shefrin, Executive Director for Managed Security Services at Comcast Business Many organizations underappreciate the risk of distributed denial-of-service (DDoS) attacks, which remain a significant threat to the availability […]
How To Protect Against The 83 million Cyber Attacks Detected In 2021
The 4 Basic Cybersecurity Practices Experts Say Prevent Most Attacks By CyberLock Defense, Lockton Affinity It’s a familiar message at CyberLock Defense: multi-factor authentication, threat monitoring, response planning and risk […]
Micro-Segmentation: Where Does It Fit into Zero Trust?
Micro-Segmentation Is Not Zero Trust Alone Or Vice Versa By Brian Haugli – CEO, SideChannel Micro-segmentation is not Zero Trust. It is the technology component to realize a Zero Trust […]
Cybersecurity For Our Nation’s Critical Infrastructure
How you can do your part to protect mission-critical assets and services By Kamil Karmali, Global Commercial Manager, Cybersecurity, Rockwell Automation The Cybersecurity and Infrastructure Security Agency (CISA) describes critical infrastructure as […]
Why Throwing Money at Cybersecurity Doesn’t Work
By Zac Amos, Features Editor, ReHack Cyberattacks have become more frequent and debilitating as the work gets more tech-centric. With so many advanced and expensive security tools available, companies should […]
Why Cyber-Attacks on The Cloud Are Rising and How to Prevent Them
Increase in implementation of cloud by government and private organizations to improve efficiency and save costs made it the prime target for cyber-criminals. However, taking security measures can enable smooth […]
What We Have Learnt Building a Global Security Conscious Culture
By Nicola McCoy, Chief Information Security Officer at RSM International The growing cyber risk is impacting global businesses of all shapes and sizes as ‘bad actors’ develop more sophisticated and […]
Can Cloud Telephony Services with Military Grade Security Enable Organizations to Create High Brand Value?
By Shubham Patidar, Research Consultant at Fact.MR In today’s technology driven world, the workforce is spread out between those working remotely and those working in offices, with some planning on […]