News

Reduced Swap will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs

by Rick Lober, Defense and Intelligence Systems Division Vice President and General Manager, Hughes Network Systems UAV…

5 Things Everyone Needs to Know About Cyber security

Practical ways to prevent a cyber-attack by Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of…

The case study: cyber camouflage scenario

by Milica D. Djekic The military doctrine would suggest to us how camouflaging on the battlefield could…

A joint operation by international police dismantled GozNym gang

A joint effort by international law enforcement agencies from 6 different countries has dismantled the crime gang…

Cloud Direct Connects: The Best Bet for Cyber Security

by Tim Fogarty, Director of Enterprise, Shamrock Consulting Group If you are a member of corporate IT…

Synthetic identity fraud and social engineering are growing concerns and on the rise

by Christina Luttrell With the customer, not present identity fraud becoming an increasingly prevalent issue, major shifts…

CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats

by Liviu Arsene, Global Cybersecurity Analyst, Bitdefender In a fast-changing landscape where large cyber attacks make the…

Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS flaw allowing WannaCry-Like…

The Attribution Problem – Using PAI to Improve Actor Attribution

By Brian Pate, SVP, Babel Street Within the cyber community, conventional wisdom is that malicious actors can…

Why CIOs/CISO’s Positions Are Becoming More Challenging

By Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company It’s your worst…

Show Buttons
Hide Buttons