Thursday, December 5, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

Air APT: State-sponsored entities targeting Airline Industry per NETSCOUT

Executive Summary Airlines and the airport industry in general are highly lucrative targets for APT groups; they are rife with information that other countries would find useful.  NETSCOUT data from 2019 shows airport and airline targeting remains strong and steady,...

6 Email-Specific Cybersecurity Vulnerabilities to Watch Out For

By Kayla Matthews, Freelance Writer, ProductivityBytes.com Due to the importance of email for people's personal and work lives, you probably can't imagine being without it for a day — or even a few hours. Unfortunately, hackers know how today's society...

The Shortcomings of Shared Secrets: Why Password-Less Must Be the Path Forward

By George Avetisov, Cofounder and CEO, HYPR  Since the dawn of the Internet, there has been a constant struggle between those trying to secure their personal information and those trying to steal it. Although there have been many iterations of...

Cybersecurity Essentials for Small and Medium Businesses

Protect your business from hackers by knowing some of the top cybersecurity essentials you should adapt within your organization. By Alex Hunter, Business Development Representative, ImageWare Systems Both government agencies and big companies like Target have been known to fail when...

Role of Identity and Access Management (IAM) in Cyber Security

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc In today’s digitally enabled world, Identity and Access Management (IAM) plays a critical role in any enterprise security plan, as it is inseparably linked to the security and productivity of companies....

10 Steps to Kicking Off Your Insider Threat Program

By Mark Wojtasiak, vice president, Code42 Malware, ransomware and other external cyber threats are usually the security threats that grab the most headlines. You might be surprised to know that insider threats are one of the largest unsolved issues in...

Five Cyber Security Best Practices to Follow

It is estimated that businesses will be shelving out an estimated $11.5 billion in expenses due to ransomware in 2019. Cyber-attacks are occurring with increasing alacrity this year, one on average every 14 seconds. The impact of cyber security...

Maersk reinstalled 45,000 PCs and 4,000 Servers after NotPetya Attack

The shipping giant Maersk chair Jim Hagemann Snabe revealed its company reinstalled 45,000 PCs and 4,000 Servers after NotPetya the attack. The shipping giant Maersk was one of the companies that suffered the NotPetya massive attack, in August 2017 the company announced...

Insider Threat Mitigation Training this Summer

While most CISO’s, IT Executives and Staff are planning out a relaxing summer with their families – vacations, barbecues and cookouts, camping and fishing, a disgruntled employee may be planning to steal a company's intellectual property, trade secrets, or...

Cyber security Checklist: How to Keep Your Business Secure

By Lucy Manole, Content Writer, Right Mix Marketing Source: Freepik In this era of digitalization, businesses are moving online faster than ever, resulting in an explosion of data. Most companies have moved to a cloud-based platform, which helps facilitate business activities. As...

STAY CONNECTED

36,002FansLike
56,039FollowersFollow
Show Buttons
Hide Buttons