The Quantum Tipping Point

Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on The Quantum Tipping Point

Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry

Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & Chiyi Lin, product line manager TXOne Networks Until about ten years ago, […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry

Why Building Managers Need to Prioritize Cybersecurity

By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things (IoT), buildings have become elaborate networks of software and hardware designed to […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Why Building Managers Need to Prioritize Cybersecurity

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

Why Ransomware is Only a Symptom of a Larger Problem

While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Why Ransomware is Only a Symptom of a Larger Problem

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X