How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

How to Avoid Spam Texts and Protect Personal Information in the Digital Age

With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on How to Avoid Spam Texts and Protect Personal Information in the Digital Age

Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Getting Started with Active Directory Security

Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Getting Started with Active Directory Security

Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

Thanks to the rise of machines and shift towards zero-trust security, organizations’ security will require a new type of identity management By Murali Palanisamy, chief solutions officer, AppViewX   The […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine

While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine

How To Effectively Secure Connected Devices

By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on How To Effectively Secure Connected Devices

Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and Cisco. Threat actors are exploiting a recently addressed server-side request forgery (SSRF) […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

New evolving Abcbot DDoS botnet targets Linux systems

Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. Researchers from Qihoo 360’s Netlab security team have spotted a new botnet, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on New evolving Abcbot DDoS botnet targets Linux systems

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X