Key Differences in Securing OT & IT Environments

Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of Corporate Development, Cyolo The increasing cyberattacks against critical sectors, in […]

Posted in Cyber Security News | Comments Off on Key Differences in Securing OT & IT Environments

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […]

Posted in Cyber Security News | Comments Off on Institutionalizing Awareness to Stop Cyberattacks

Implementing ZTA: Benefits and Best Practices

By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of industrial systems, the realm of cybersecurity has been thrust into […]

Posted in Cyber Security News | Comments Off on Implementing ZTA: Benefits and Best Practices

Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report

Cyberdefenders plug the holes, so attackers innovate to try to stay ahead. By Aaron Walton, Threat Intel Analyst, Expel Most cyberattackers don’t try to reinvent the wheel: as long as […]

Posted in Cyber Security News | Comments Off on Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report

What are the Essential Skills for Cyber Security Professionals in 2024?

Where should you invest time and resources to drive success when it comes to the must-have skills and tools for senior leaders in the industry. By Sarah Gilchriest, Chief People […]

Posted in Cyber Security News | Comments Off on What are the Essential Skills for Cyber Security Professionals in 2024?

Enhancing The Nation’s Cybersecurity Workforce

Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […]

Posted in Cyber Security News | Comments Off on Enhancing The Nation’s Cybersecurity Workforce

Does Zero Trust Improve Productivity?

By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […]

Posted in Cyber Security News | Comments Off on Does Zero Trust Improve Productivity?

Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy

WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy are becoming more and more critical with digital transformation. The […]

Posted in Cyber Security News | Comments Off on Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy

Cybersecurity Threats in Global Satellite Internet

By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […]

Posted in Cyber Security News | Comments Off on Cybersecurity Threats in Global Satellite Internet

Classic Information Security Management Errors

How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […]

Posted in Cyber Security News | Comments Off on Classic Information Security Management Errors

How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?

By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating systems has become a critical concern for organizations of all […]

Posted in Cyber Security News | Comments Off on How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?

Prioritizing Action After the Threat Headlines

By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […]

Posted in Cyber Security News | Comments Off on Prioritizing Action After the Threat Headlines

Introducing GitHub Insights, Latest Solution to Combat Growing Threat to APIs

By Scott Gerlach, CSO – StackHawk The accelerated demand for software applications and application programming interfaces (APIs) across industries has caused organizations’ attack surfaces to become larger than ever before. […]

Posted in Cyber Security News | Comments Off on Introducing GitHub Insights, Latest Solution to Combat Growing Threat to APIs

Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security

Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly mobile networks, have become the backbone of our modern, interconnected […]

Posted in Cyber Security News | Comments Off on Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security

Deepfakes and AI’s New Threat to Security

The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […]

Posted in Cyber Security News | Comments Off on Deepfakes and AI’s New Threat to Security

A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding the digital assets of a thriving healthcare organization renowned for […]

Posted in Cyber Security News | Comments Off on A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary

Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my recent articles, I’ve discussed the importance of looking beyond resumes […]

Posted in Cyber Security News | Comments Off on Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary

Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents

The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke Bader, Director, Membership and Programs, FAIR Institute The FAIR Institute, […]

Posted in Cyber Security News | Comments Off on Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […]

Posted in Cyber Security News | Comments Off on Addressing Bias in Insider Risk Monitoring

How Cloud Solutions Can Lead to Stronger, More Secure IT Operations

By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of $12.3 billion on cloud goods and services – a 30 […]

Posted in Cyber Security News | Comments Off on How Cloud Solutions Can Lead to Stronger, More Secure IT Operations

What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future

By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication networks. However, even as we rely on it to safeguard […]

Posted in Cyber Security News | Comments Off on What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future

How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry

Cybersecurity will be one of the key concerns as last-mile logistics companies look to enhance efficiency with autonomous vehicles. By Anar Mammadov, CEO, Senpex Technologies Travelers who hail a taxi […]

Posted in Cyber Security News | Comments Off on How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry

The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market companies. In fact, Deloitte’s 2023 Mid-Market Technology Trend report found […]

Posted in Cyber Security News | Comments Off on The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved […]

Posted in Cyber Security News | Comments Off on The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around […]

Posted in Cyber Security News | Comments Off on Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

Safeguarding the Code That Drives Modern Vehicles

By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […]

Posted in Cyber Security News | Comments Off on Safeguarding the Code That Drives Modern Vehicles

Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset

By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […]

Posted in Cyber Security News | Comments Off on Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset

Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack

by Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […]

Posted in Cyber Security News | Comments Off on Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack

AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud

By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as a whole. This is a problem that is accelerating as […]

Posted in Cyber Security News | Comments Off on AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud

2024 Predictions: The Rise of AI Brings New Security Challenges

By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […]

Posted in Cyber Security News | Comments Off on 2024 Predictions: The Rise of AI Brings New Security Challenges

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X