Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read, […]
COVID-19: Disaster Preparedness for the Digital-First Business
By Otavio Freire, President, CTO and Co-Founder SafeGuard Cyber COVID-19, also known as coronavirus, is proving to be a stubborn pathogen. Tragically, the global death toll has now surpassed 3,000. […]
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls […]
Understanding the True Value of Digital Health Data
By Anne Genge, CEO, and co-founder of Alexio Corporation The story of Bob ‘What do I care if someone reads my dental chart?” This is what Bob said before I […]
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management […]
A Terrifying Diagnosis: Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
By Pieter Danhieux, Co-Founder and Chairman/CEO of Secure Code Warrior Cyberattacks have become a way of life these days. People almost expect to hear news about some new vulnerability or […]
How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that. […]
The Consumer Technology Association – What Trends Lie Ahead in the 2020’s
If one thing was made boldly apparent at the CES 2020, it’s that everything is trending toward connectivity. Soon, there will be scarcely any facet of our daily lives that […]
Not All Hackers Are Criminals, And Some of The Good Guys Can Earn A Million Dollars
Dr. Roberto Di Pietro, a full professor of cybersecurity at Hamad Bin Khalifa University’s College of Science and Engineering, explains why there is a misconception about the term ‘hackers’. The […]
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal […]
The Growing Importance of API Security
APIs are everywhere, and they are ripe targets for malicious attacks By Ameya Talwalker, Co-founder and CPO, Cequence Security Earlier this year I wrote a blog about key trends in […]
Industrial Control System Vulnerabilities: A Prime Target of Our Critical Infrastructure by Adversaries
By Dr. Daniel Osafo Harrison, DCS, C|CISO, CISM, CISA, CRISC, Security+ Industrial control system (ICS) is a dynamic technological system with subsystems such as programmable logic controllers (PLCs), Remote Terminal […]
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly […]
5 Recruitment Predictions in Cybersecurity For 2020
By Karl Sharman As we prepare for more figures to be produced saying the amount of jobs unfilled has increased by another 20%, I want to challenge every person in […]
Cybersecurity Talent Shortage and Ways to Address the Gap
By Blake Tinsley, Founder, and CEO, Prosyntix The cyber threat landscape is ever-evolving. From rapid deployment of new code for application usage, the Internet of Things (IoT) pushing for billions […]
Secure Passwords are not Always Secure
Just because it meets the complexity test does not mean it is secure. By James Gorman, Lead Writer and Staff Reporter Cyber Defence Media Group Most of the insider threats and […]
Defending Forward
Human-Machine Teaming for Automated Predictive Prevention at Scale By James Wallace Hess, Director of Development, Cythereal Today’s threat landscape demands automated analysis and predictive prevention to efficiently harden protection structures […]
Privacy – A misunderstood issue
By Michael J. Nash Introduction Living in a modern, interconnected world brings enormous benefits. The most obvious is that the speed of communication and information sharing has opened up new […]
Accelerating the Pace of Government IT Modernization
By Jeff Elliott For decades, the federal government has been hamstrung in its efforts to adopt new IT systems by the glacial pace of RMF accreditation and the manual processes […]
The Struggle of Updating Government Cybersecurity Measures
By Kayla Matthews The cybersecurity landscape is ever-changing, and staying on top of developments often requires promptness. Unfortunately, government bodies typically aren’t known for taking quick action. That’s because they […]
5 Key Steps to Secure IOT Product Development
By Kateryna Boiko, Marketing Manager, Mobilunity A new concept that has taken the world by storm is the so-called “Internet of Things” (IoT). IoT refers to systems designed to transfer […]
How to Address Multi-Cloud Security
By William Klusovsky, CISSP, CISM,NTT Ltd. Networks for our businesses are not as simple as they used to be. With the evolution of cloud environments and the multitude of “everything […]
Investing in Cybersecurity
By Sean Drake, Venture Investor Reporter for Cyber Defense Magazine As one of the top Venture Investor Reporters for CDM, I get to cover all the hot and interesting cybersecurity […]
Conquering the Cyber Security Challenges of The Cloud
By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing economies of scale and breakthrough technological advances to modern organizations, but it is more […]
Data Privacy in A Device-Driven World: Navigating the Impact Of California’s 2020 IOT Security Legislation
A call for consumer education on-device security vulnerabilities in light of the increasing push for IoT security regulation By Brian Murray Throughout the past few decades, the Internet of Things […]
AttackiQ Report On Ponemon Survey:Despite Spending An Average Of $18.4 Million On Cybersecurity Solutions, Organizations Still Get Breached
Enterprises plan on increasing their security budgets in the next year too. However, the key to preventing breaches relies upon accurately identifying and remediating gaps in current security defenses. By […]
AttackIQ 2020 Predictions
By Christopher Kennedy, CISO and VP of Customer Success, AttackIQ 2020 Election Security Insecurity: Election security will be an open wound that can’t be healed in time for the 2020 […]
ForgeRock 2020 Predictions
By Ben Goodman, SVP at ForgeRock and CISSP 2020 Will be the Beginning of the End of Passwords. Consumers already log in to dozens of protected resources everyday: from email, […]