Watch out, hackers are targeting CVE-2018-0296 Cisco fixed in 2018
Cisco has warned customers that hackers continue to target Cisco ASA and Firepower Appliance products by exploiting the CVE-2018-0296 flaw. Experts warn that threat actors continue to exploit the CVE-2018-0296 […]
Maze Ransomware operators threaten victims to publish their data online
The victims of the Maze Ransomware now face another threat because operators behind the malware could become publish their data online. The victims of the Maze Ransomware are facing another […]
Why Insider Data Breaches Will Continue in 2020
By Randy Reiter CEO of Don’t Be Breached Insider Data Breaches That Occurred in 2019 More than two-thirds of corporations are not prepared to combat Insider Data Breaches as reported […]
The Growing Costs of Cyber Attacks on UK Small Businesses
By Dan Baker, Content Writer, SecureTeam The amount of cyber attacks in the UK and across the world continues to grow each year and small businesses are increasingly the targets […]
Multifactor Authentication & The Sobering Reality for Organizations Without It
By François Amigorena, CEO and founder, IS Decisions Organizations without multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. Compromised credentials are […]
Automatic for The SOC People
How Automation Can Quell Those Pesky False Positives By Steve Salinas, Director of Product Marketing, Siemplify As a newly hired cybersecurity analyst, you’re excited to start vanquishing threats and thwarting […]
The Only Recession in Cybersecurity
Sleep-deprived, overworked and fatigued security professionals impose huge risks to an organization By Karl Sharman, Vice-President, BeecherMadden Tired, overworked and fatigued employees pose huge risks to organizations. It’s obvious to […]
The Email Security Challenges
By Milica D. Djekic Let’s try to remember the times of the old, good letters when the postman was knocking at your door or apparently leaving the message in your […]
The Rise of Cybercrime-As-A-Service
And What It Means for Businesses By Mark Belgrove, Head of Cyber Consultancy, Exponential-e In a sea of increasingly complex cyber warfare and nation-state hackers, it can be easy to […]
The Internet Got Safer In 2019: A Cybersecurity Year in Review
By Daniel Kanchev, Chief Enterprise Architect, SiteGround It’s just a fact: In 2019 the Internet got safer by default. SSL encryption adoption is now at an all-time peak, with the […]
The Blockchain And Wireless Technologies
By Milica D. Djekic A Perspective The Blockchain by itself is any well-protected record of data that is transmitted through a cryptographically assured communications channels. It may appear that such […]
The Security Challenges of Robotic Process Automation—A Primer
By Kevin Ross, Global Solutions Engineer, CyberArk Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These systems enable software robots to replicate the actions […]
How to Become a Cybersecurity Sleuth?
By Edith Santos, Director of Global Incident Response for NTT, Ltd. So, you want to become a cybersecurity sleuth? Excellent! We need you and so does everyone else. A quick […]
Cyber Safety Tips for The Holidays
Practicing Good Cyber Hygiene to Avoid Holiday Cyber Attacks By Dr. Bob Duhainy, Walden University Doctor of Information Technology core faculty member While millions of holiday shoppers will be spending money […]
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days […]
Visibility and Anomaly Detection in The Age of Iot
By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the […]
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once […]
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities and local governments in Texas were hit by a coordinated ransomware attack. The hackers […]
BeyondTrust Cybersecurity Predictions for 2020 & Beyond
2020 Prediction Contributors: Morey Haber, CTO/CISO at BeyondTrust and Christopher Hills, Sr. Solutions Architect, Office of the CTO at BeyondTrust It’s possible that the earliest security predictions began on that […]
Protecting Against Modern Cyberattacks
By Bala Sethunathan, CISO and Global Director of the Security Practice at SoftwareONE Modern cyberattacks are increasing in complexity and sophistication, as hackers are developing attack tools at a faster […]
6 Benefits of Using MFT for Encrypted File Transfers
A managed file transfer (MFT) solution is a product that successfully handles all aspects of inbound and outbound file transfers while utilizing industry-standard network protocols and encryption. It can automate […]
Persistent Cybersecurity Industry Challenges: Salary Survey Finds Parity Gaps for Gender, Diversity and Trouble Sustaining Work-Life Balance
By Trevor Daughney, VP of Product Marketing, Exabeam Annually, Exabeam conducts a Cybersecurity Salary, Skills, and Stress Survey* to gain insight on trends in the salaries of security professionals, as […]
Oh, my! PerCSoft’s Irony
By Charles Parker, II; MBA/MSA/JD/LLM/PhD PerCSoft is a Wisconsin business. The organization provides online data backup services for dental offices. This operates by placing data in the cloud. They had […]
Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?
A brief interview summary from the Digital Transformation EXPO Europe 2019 London, England – There’s a tremendous amount of buzz surrounding A.I. these days. Some believe it will present us […]
TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that. How did they accomplish this esteemed […]
3-D Secure: The Legacy Protocol Making a Comeback to Secure Online Payments
By Jennifer Singh Consumers today are spoiled for choice – which clothes to wear, gadgets to buy and payment networks to use to acquire these goods. The competition is tight […]
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that […]
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]