Sunday, January 19, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

Iot Security and Privacy

Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age of IoT”. What makes it an “Age of IoT”? The answer...

Encryption Is Key to Guarantee Data Is Anonymous

By Julian Weinberger, CISSP, Director of Systems Engineering at NCP engineering Regulatory initiatives such as the EU General Data Protection Regulation (GDPR) have granted consumers powerful rights to determine how organizations collect and use personally identifiable information. Companies that hold on...

Cyber Safety Tips for The Holidays

Practicing Good Cyber Hygiene to Avoid Holiday Cyber Attacks By Dr. Bob Duhainy, Walden University Doctor of Information Technology core faculty member While millions of holiday shoppers will be spending money on the best gifts for their loved ones, cybercriminals will be...

Getting PKI Right

Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view PKI as a vital layer within the security framework, helping to...

How to Know If Someone Is Watching You on Your Camera

In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist,  SEOforX In this era of video chatting and social media live streaming, your computer’s webcam can never...

The Ultimate Guide to SSL/TLS Decryption

Six Features to Consider When Evaluating SSL/TLS Inspection Solutions By Babur Khan, Technical Marketing Engineer, A10 Networks Encrypted traffic accounts for a large and growing percentage of all internet traffic. While the adoption of Secure Sockets Layer (SSL), and its successor,...

Seven Security Predictions For 2020

By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions for the coming year. Even though the threats coming at...

Multifactor Authentication & The Sobering Reality for Organizations Without It

By François Amigorena, CEO and founder, IS Decisions  Organizations without multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. Compromised credentials are considered to be one of the biggest threats to companies...

CDM Available on Mobile Platforms in January 2018

You asked and we listened.  We're thrilled to announce native mobile versions of Cyber Defense Magazine.  Our first platforms are ready - Android with a hybrid HTML 5 version now available directly for download here, for your Apple iOS...
Visibility and Anomaly Detection in The Age of Iot

Visibility and Anomaly Detection in The Age of Iot

By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the maxim “you can’t protect what you can’t see” holds true,...

STAY CONNECTED

35,921FansLike
56,029FollowersFollow
Show Buttons
Hide Buttons