Friday, September 25, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

Weaknesses of Biometric Authentication

Weaknesses of Biometric Authentication

0
By Mark Perkins, MS, CISSP, IT ManagerIn today’s digital world, knowing who is on the other end of the wire is more important than ever.  The democratization of digital technology and proliferation of Internet access, in addition to the...
Media Content Captured on Mobile Is Driving Compliance Problems

Media Content Captured on Mobile Is Driving Compliance Problems

0
Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, InkscreenRecent headlines are once again demonstrating the consequences of employees' inappropriate leaking photos from mobile devices, and are shedding new light...
Funding Schemes and Cyber Security

Funding Schemes and Cyber Security

0
By Milica D. DjekicWhat a lovely day; you are just searching your web for some online business opportunities or you are reviewing the cyberspace to get the stipend for your student’s service. Here we go! The option simply appeared...
How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters

How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software...

0
By Don Boxley, co-founder, and CEO, DH2iCybersecurity researchers at the independent security research group JSOF recently discovered at least 19 security vulnerabilities that are found at the base of almost all Internet of Things (IoT) products. The zero-day...
Building Secure Software Right From the Start Four Steps for an Effective AppSec Strategy

Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

0
By Joanne Godfrey, Security Evangelist, ZeroNorthCompanies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But one false move, such as releasing vulnerability-riddled software that facilitates...

Secure Revenue Success with a Better User Experience (UX)

0
Join us for a live webinar - A Before and After Success Story on How One Cyber Security Company Addressed UX to Increase Product Adoption and Generate Revenue - Thursday, September 25, 2020 at noon. In early 2020, Hypori had...
Do Not Forget to Securely Lock Your Data in Microsoft Teams

Do Not Forget to Securely Lock Your Data in Microsoft Teams

0
By Johanna Reisacher, Marketing Manager, Secomba GmbHMore and more employees work from home. As a result, in the last months the demand for Microsoft products, especially Microsoft Teams, has increased. Therefore, in many companies and organizations, a large amount...

Zerologon attack lets hackers to completely compromise a Windows domain

0
Zerologon attack allows threat actors to take over enterprise networks by exploiting the CVE-2020-1472 patched in the August 2020 Patch Tuesday.Administrators of enterprise Windows Servers have to install the August 2020 Patch Tuesday as soon as possible to protect their...
Navigating Remote Work and Security in the COVID-19 Era

The “New Normal” – Navigating Remote Work and Security in the COVID-19 Era

0
By Bill Delisi, CEO of GOFBAThere are many “new normal” that apply to different parts of life and certain industries. For cybersecurity, a core change to the landscape is the impacts of remote work and security issues both during...
Defending Ever Expanding Networks and IT Systems

Defending Ever Expanding Networks and IT Systems

0
Architecture at Scale is NeededBy Trevor Pott, Product Marketing Director, Juniper NetworksHow many systems must an information security professional defend?  For most people, the numbers involved are abstract concepts.  We think we understand them, but when confronted with them...

STAY CONNECTED

35,232FansLike
55,610FollowersFollow