Monday, October 21, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

6 Email-Specific Cybersecurity Vulnerabilities to Watch Out For

By Kayla Matthews, Freelance Writer, ProductivityBytes.com Due to the importance of email for people's personal and work lives, you probably can't imagine being without it for a day — or even a few hours. Unfortunately, hackers know how today's society...

Role of Identity and Access Management (IAM) in Cyber Security

by Bhavdip Rathod, IAM Solution Architect, Sailpoint Technologies, Inc In today’s digitally enabled world, Identity and Access Management (IAM) plays a critical role in any enterprise security plan, as it is inseparably linked to the security and productivity of companies....

Five Cyber Security Best Practices to Follow

It is estimated that businesses will be shelving out an estimated $11.5 billion in expenses due to ransomware in 2019. Cyber-attacks are occurring with increasing alacrity this year, one on average every 14 seconds. The impact of cyber security...

The Shortcomings of Shared Secrets: Why Password-Less Must Be the Path Forward

By George Avetisov, Cofounder and CEO, HYPR  Since the dawn of the Internet, there has been a constant struggle between those trying to secure their personal information and those trying to steal it. Although there have been many iterations of...

Insider Threat Mitigation Training this Summer

While most CISO’s, IT Executives and Staff are planning out a relaxing summer with their families – vacations, barbecues and cookouts, camping and fishing, a disgruntled employee may be planning to steal a company's intellectual property, trade secrets, or...

10 Steps to Kicking Off Your Insider Threat Program

By Mark Wojtasiak, vice president, Code42 Malware, ransomware and other external cyber threats are usually the security threats that grab the most headlines. You might be surprised to know that insider threats are one of the largest unsolved issues in...

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point

NASA Office of Inspector General revealed that the Agency's network was hacked in April 2018, intruders exfiltrated roughly 500 MB of data related to Mars missions. According to a report published by the NASA Office of Inspector General, hackers...

How To Implement an Effective Vulnerability Management Program

By Stephen Newman, Secureauth/Core Security The September Equifax data breach that put more than 140 million people at risk of identity theft and financial fraud could have been prevented. A patch for the vulnerability that attackers exploited was available two...

Were Major US Businesses and ISPs Hit with An Iranian Cyber Army Attack Yesterday?

by Gary S. Miliefsky, CISSP, Publisher, Cyber Defense Magazine On Monday, June 24, 2019, the US Government announced ‘cyber attack’ sanctions against Iran for their alleged shooting down of an unmanned US Drone.  Throughout the day, yesterday, many US news...

Maersk reinstalled 45,000 PCs and 4,000 Servers after NotPetya Attack

The shipping giant Maersk chair Jim Hagemann Snabe revealed its company reinstalled 45,000 PCs and 4,000 Servers after NotPetya the attack. The shipping giant Maersk was one of the companies that suffered the NotPetya massive attack, in August 2017 the company announced...

STAY CONNECTED

36,142FansLike
56,083FollowersFollow
Show Buttons
Hide Buttons