5 Steps to Ensure Iot Security Amidst CMMC Compliance
By Mike Raymond, Federal Sales Manager, Ordr Cyber threats against the U.S. and the Department of Defense (DoD) are very real, and efforts related to the department’s Cybersecurity Maturity Model […]
Cyber Security Patent Lawsuits on The Rise and The Need for Shared Innovation in Cyber Security
By Keith Bergelt, CEO of Open Invention Network (OIN) According to the FBI’s Internet Crime Complaint Centre, by June of 2020, daily digital crime in the U.S. had risen by […]
Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions
Provide Users Fast and Secure Connectivity from Anywhere with the Leading SASE Platform Based on Containerization for Complete Data Isolation With increasing bandwidth, encrypted traffic, shifts to cloud applications like […]
One Year on From Whatsapp Hack- What’s Changed?
In 2019, WhatsApp was hacked using sophisticated NSO spyware, Pegasus, used to spy on iOS WhatsApp users’ phones. By Nicole Allen, Marketing Executive, SaltDNA One year on from WhatsApp Hack […]
Cyber-Attacks Are the New Norm and Ransomware Is on The Rise
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G, […]
COVID Impact on MSSPs
By Tristan Hinsley, Cybersecurity Expert, TDI Security Given the remote nature of most Managed Security Service Providers’ (MSSPs) business operations, most would imagine they would be well-positioned to deal with […]
Are Your Corporate Networks Ready for An Impending ‘Return to Work’ Cyber Attack?
As employees rejoin the network, cyber risks are heightened. Why it’s important to have essential security measures in place before it’s too late. By Stephen Burke, Cyber Risk Aware CEO […]
Centrify Study Lifts the Hood on Cybersecurity Policy and Threat Challenges During COVID-19
Recent study shows increased breaches in cybersecurity led nearly 40% of UK business decision makers to dismiss staff members since the start of the pandemic By Andy Heather, VP and […]
Cyber Liability Insurance – Safe Bet or Sales Gimmick?
By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we see more stories about companies overtaken by this type of cyberattack. Garmin and Canon, […]
Mapping Automation to the MITRE ATT&CK Framework
By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative, both […]
Automotive Cybersecurity Is Not One-Size-Fits-All. Here’s How Oems And Tier 1s Can Tailor Their Approach to Meet the Needs of The Market
OEMs, Tier 1s, and key supply chain players all differ in their approach to cybersecurity, opting for strategies that align specifically with their needs. Chief Product and Marketing Officer Nathaniel […]
Manual vs. Automatic Cybersecurity Testing: What’s the Difference?
By Tamir Shriki, Customer Operations Manager, XM Cyber In the context of cybersecurity, if you want to protect something, you need the ability to test its defenses. It’s the only […]
5 Ways to Avoid Security Automation Pitfalls
By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to boost threat detection and response. […]
Media Content Captured on Mobile Is Driving Compliance Problems
Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, Inkscreen Recent headlines are once again demonstrating the consequences of employees’ […]
Protecting a Mobile Workforce with Hybrid DNS Security
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox The future of the workplace is undoubtedly a remote workforce, accessing the corporate network via mobile devices and the […]
New Research Highlights Importance of HTTPS Inspection to Detect Encrypted Malware
Two-thirds of malware in Q1 2020 was delivered via HTTPS traffic, Monero cryptominers are on the rise and more By Marc Laliberte, Senior Security Analyst at WatchGuard Technologies Today’s threat […]
Cyber Literacy in Post-Digital Era as Part of National Security
By Aliaksei Hapeyeu, master’s degree student from Shandong University Cyberspace in the post-digital era has become not only a tool, but also a domain where people live, work, and relax. […]
Cyber Warfare and Its Impact on Businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
What Is Being Done, And How Can They Improve?
By Martin Banks People have worried about the safety of nuclear energy since it first came around in the mid-twentieth century. Nuclear energy has a lot of potential for powering […]
Industrial Control System – Security Focus of Federal Effort
By Trip Hillman, Director of Cybersecurity Services at Weaver More and more, industrial control systems have been the targets of malware, ransomware, and other kinds of cyberattacks. These attacks jeopardize […]
There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic
By Carolyn Crandall, Chief Deception Officer, Attivo Networks One of the most popular targets for attackers, cybercriminals, and other bad actors is east/west network traffic. This is network traffic that […]
Cyber Against Granny
By Yotam Gutman, SentinelOne Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged 60 and over) in the United States. Cybercrime can be defined as “any […]
HIPAA Compliance and The Protection of Cyber Security
By Andrew Mikhailov, CTO at Zfort Group Businesses face the risk of severe cyber-attacks – the present-day cyberspace criminals are well-organized, thoughtful, and marketable. And one of the most sensitive […]
Why Academic Openness and A Rise in Online Classes Should Invoke A Renewed Focus on Security
By Anthony Bettini, CTO, WhiteHat Security For decades, researchers and students from around the world have come to study and collaborate, research, and innovate at American universities and colleges under […]
Build Your AI Incident Response Plan… Before It’s Too Late
By Patrick Hall* and Andrew Burt** * Patrick Hall is a principal scientist at bnh.ai, a boutique law firm focused on AI and analytics, and an adjunct professor in the […]
Looks Like Russian Hackers Are on An Email Scam Spree
By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]
4 Simple Ways to Repel Ransomware as The Rise in Remote Work Continues
By Kris Lahiri, Co-founder and Chief Security Officer of Egnyte Ransomware attacks are now the most common security incident taking place today. According to a recent report from TrustWave, ransomware […]
Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce
By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential […]
Cyber Warfare and its impact on businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments, and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
Network Security Is Not Data Security
Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks […]