Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy

WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy are becoming more and more critical with digital transformation. The […]

Posted in Cyber Security News | Comments Off on Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy

Cybersecurity Threats in Global Satellite Internet

By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […]

Posted in Cyber Security News | Comments Off on Cybersecurity Threats in Global Satellite Internet

Classic Information Security Management Errors

How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […]

Posted in Cyber Security News | Comments Off on Classic Information Security Management Errors

How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?

By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating systems has become a critical concern for organizations of all […]

Posted in Cyber Security News | Comments Off on How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?

Prioritizing Action After the Threat Headlines

By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […]

Posted in Cyber Security News | Comments Off on Prioritizing Action After the Threat Headlines

Introducing GitHub Insights, Latest Solution to Combat Growing Threat to APIs

By Scott Gerlach, CSO – StackHawk The accelerated demand for software applications and application programming interfaces (APIs) across industries has caused organizations’ attack surfaces to become larger than ever before. […]

Posted in Cyber Security News | Comments Off on Introducing GitHub Insights, Latest Solution to Combat Growing Threat to APIs

Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security

Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly mobile networks, have become the backbone of our modern, interconnected […]

Posted in Cyber Security News | Comments Off on Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security

Deepfakes and AI’s New Threat to Security

The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […]

Posted in Cyber Security News | Comments Off on Deepfakes and AI’s New Threat to Security

A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding the digital assets of a thriving healthcare organization renowned for […]

Posted in Cyber Security News | Comments Off on A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM

Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary

Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my recent articles, I’ve discussed the importance of looking beyond resumes […]

Posted in Cyber Security News | Comments Off on Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary

Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents

The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke Bader, Director, Membership and Programs, FAIR Institute The FAIR Institute, […]

Posted in Cyber Security News | Comments Off on Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […]

Posted in Cyber Security News | Comments Off on Addressing Bias in Insider Risk Monitoring

How Cloud Solutions Can Lead to Stronger, More Secure IT Operations

By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of $12.3 billion on cloud goods and services – a 30 […]

Posted in Cyber Security News | Comments Off on How Cloud Solutions Can Lead to Stronger, More Secure IT Operations

What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future

By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication networks. However, even as we rely on it to safeguard […]

Posted in Cyber Security News | Comments Off on What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future

How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry

Cybersecurity will be one of the key concerns as last-mile logistics companies look to enhance efficiency with autonomous vehicles. By Anar Mammadov, CEO, Senpex Technologies Travelers who hail a taxi […]

Posted in Cyber Security News | Comments Off on How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry

The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market companies. In fact, Deloitte’s 2023 Mid-Market Technology Trend report found […]

Posted in Cyber Security News | Comments Off on The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved […]

Posted in Cyber Security News | Comments Off on The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around […]

Posted in Cyber Security News | Comments Off on Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

Safeguarding the Code That Drives Modern Vehicles

By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […]

Posted in Cyber Security News | Comments Off on Safeguarding the Code That Drives Modern Vehicles

Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset

By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […]

Posted in Cyber Security News | Comments Off on Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset

Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack

by Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […]

Posted in Cyber Security News | Comments Off on Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack

AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud

By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as a whole. This is a problem that is accelerating as […]

Posted in Cyber Security News | Comments Off on AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud

2024 Predictions: The Rise of AI Brings New Security Challenges

By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […]

Posted in Cyber Security News | Comments Off on 2024 Predictions: The Rise of AI Brings New Security Challenges

Generative Ai: The Future of Cloud Security

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […]

Posted in Cyber Security News | Comments Off on Generative Ai: The Future of Cloud Security

What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?

By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating that someone had made a purchase from my account. They […]

Posted in Cyber Security News | Comments Off on What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?

Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective

By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key decision makers. This disconnect may be one of the reasons […]

Posted in Cyber Security News | Comments Off on Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective

Wireless Peripheral Devices – Security Risk, Exploits and Remediation

This article covers the importance of Wireless Peripheral Device Security, the risks involved, and ways to remediate the security exploits. By Prathibha Muraleedhara and Akhilesh Bhangepatil Abstract The advancement of […]

Posted in Cyber Security News | Comments Off on Wireless Peripheral Devices – Security Risk, Exploits and Remediation

With The World Distracted, China Stirs Trouble in The Asia Pacific

By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction – Thrilla in Manilla President Biden warned that “conflict and chaos could spread to the Indo-Pacific” from late October, and, amidst the […]

Posted in Cyber Security News | Comments Off on With The World Distracted, China Stirs Trouble in The Asia Pacific

What You Need to Know About the Cybersecurity Market in 2024

By Doug Saylors, Partner, Co-lead, Cybersecurity, Information Services Group (ISG) The cybersecurity market offers promising opportunities for real-time threat intelligence through advanced technologies such as AI and ML. It’s also […]

Posted in Cyber Security News | Comments Off on What You Need to Know About the Cybersecurity Market in 2024

Understand Cyber Insurance: Rising Risks and How to Right-Size Policies

Cyber insurance can be a tricky part of cybersecurity strategy — here’s what to know in today’s security climate By John Reith, Partner Success Manager at DataStream Cyber Insurance Cyber […]

Posted in Cyber Security News | Comments Off on Understand Cyber Insurance: Rising Risks and How to Right-Size Policies

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X