Crowdsourced Security and the Gig Economy
Alive and well in the worst way By Alex Haynes, CISO, CDL Let’s pretend you have offensive security skills and you want to use them for gainful employment. You attend […]
Cybersecurity and Compliance 1-2-3? Start With G-R-C
By John South, Senior Director of Global Threat Intelligence Development at NTT, Ltd. When an individual responsible for security, compliance and risk management in a corporation addresses these topics, the […]
Slow Response Times to Blame for Phishing Attack Success on Organizations
By Atif Mushtaq, CEO, and founder, SlashNext Phishing poses a looming vulnerability for many enterprises today because the attackers have upped their game. They can now set up and take […]
Why You Should Use a VPN When Working With Cryptocurrencies?
Due to the increase in the hacking of Cryptocurrencies, it’s necessary for crypto users to use encryption tools. By Susan Alexandra, Contributing Writer, None It’s been two years since cryptocurrency […]
The Need for a Better Protection of Small Businesses
By Milica D. Djekic The small businesses are the most common way of enterprises bringing over half of the GDP to any economy worldwide. From such a perspective, it’s quite […]
Security Researchers Discover Massive Trend in Phishing Scams
Targeting Businesses 193% increase in PDF Phishing Detections indicate Phishing to still be a prime threat vector By Shawn Pope In Nuspire’s quarterly threat landscape report, three main vector datasets; […]
The Storm after the Breach
How Consumers and Institutions Should Guard against Cybertheft By Archie Agarwal, CEO & founder, ThreatModeler Data breaches and cyberattacks have been hitting several of the highest-profile financial and media institutions […]
Hybrid Offenses as a Current Security Concern
By Milica D. Djekic When we say an offense we would mean any kind of criminality being a transnational crime, human trafficking or act of terrorism. In its essence, any […]
Going Beyond Compliance: What New Regulations Mean For Your Company
Cyber Defense Magazine By Zack Schuler, founder, and CEO of NINJIO How many times have you shared a piece of personal information online over the past year? If you’re adding […]
September Patch Tuesday
Updates are Light, But Ransomware Attacks Escalate By Chris Goettl, Director of Product Management, Security, Ivanti September marks the second month in a row with a relatively light set of […]
How Consumers Can Protect Their Identity after a Data Breach
Steps to safeguard personal information in a vulnerable cyber-space. By Paige Schaffer, CEO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit In an age where large retailers, […]
Employers Catch One-Year Break on Impending California Privacy Law
By Usama Kahf, Partner, Fisher Phillips Thanks to recent negotiations among state lawmakers, it appears that California employers may get a temporary reprieve on some of the more sweeping data […]
Cloud Security Essentials — Session Monitoring
By Morey Haber, CTO & CISO, BeyondTrust The near-perfect personal attack vector is “shoulder surfing.” If you are not familiar with the concept, it is literally a threat actor looking […]
Speculative Execution and SWAPGS
A Match Made In Heaven for Motivated Threat Actors By Filip Truta, Information Security Analyst, Bitdefender What if cybercriminals could deploy an attack that is both devastating and impossible to […]
Hidden and High Priority Threats
Understanding Destructive Objects By Tyson Whitten, Vice President of Global Marketing, ReversingLabs Are you confident in what you saw today? It’s a simple, yet important question that nobody in security […]
Flexibility in Vulnerability Management: Why it’s Essential
By Jim Souders, Chief Executive Officer, Adaptiva Eighty percent of cyberattacks happen at the endpoint today. When you consider that cybercrime is projected to cost $6 trillion annually by 2021, […]
The cloud’s computing: identify – understand – secure
By Milica D. Djekic The cloud’s computing is not that new topic in computer science, so we would not deal with that as being somehow emerging. It’s something that lasts […]
Cyber Security Fears of Today and Tomorrow
“The future depends on what you do today.” ― Mahatma Gandhi By Sasha Kranjac Cyber Security Fear of Today I trust respected cloud vendors. After all, why shouldn’t I? They […]
The security’s challenges of an Internet of Things
By Milica D. Djekic The Internet of Things (IoT) is not that new concept beginning with these days. It’s more like the name of the current state being correlated with […]
Hacking the projector at a cyber event
By Milica D. Djekic You would probably be present or hear about some cybersecurity events where some of the attendees hacked the conference projector using a mobile device. Such a […]
Ransomware Is the Biggest Online Threat. Learn Who to Protect, or You’ll Hate Yourself Later
By David Balaban Previous years have shown us one important thing – ransomware is going to stay and get worse. When even the minor ransomware creators are making a lot […]
Why Cyber Security is Redefining SMEs’ Business Operations on the Cloud
By Mufassira Fathima, Content Writer, Allied Analytics LLP Modern-day IT infrastructures and data centers are revolutionized by the advent of technology and cloud-based services. The emergence of the cloud, as […]
Why compromised credentials are one of the biggest threats facing businesses today
By François Amigorena, CEO, IS Decisions As a business, there are few things worse than realizing you’ve become a victim of a serious cyber attack. The consequences can be dear, […]
Cyber Security and the Supply Chain: Strengthening the Weak Links
By Simon Taylor, VP Product at Glasswall Solutions In today’s cybersecurity climate, with high-profile hacks and data breaches constantly in the headlines, businesses are putting more effort than ever into […]
The challenges of the good incident response strategies
By Milica D. Djekic The incident response (IR) is one of the key challenges to a modern cyber defense. Practically, it would include three crucially important steps being (1) preparation, […]
Addressing the Growing Risk of Personal File-Sharing Apps at Work
By Mika Javanainen, Senior Director of Product Management, M-Files Corporation Thousands of employees around the world are inadvertently putting their organizations at risk by using personal file-sharing apps such as […]
Escaping the Gravitational Pull of Data Insecurity
By Cliff Beek, President of Cloud Constellation Corporation Passengers. Gravity. The Martian. These and many other films depict space as a hostile, frightening environment that threatens our safety and must […]
Campbell County Memorial Hospital in Wyoming hit by ransomware attack
Campbell County Memorial Hospital in Gilette, Wyoming is facing service disruptions after a ransomware attack hit its computer systems on Friday. On Friday, the Campbell County Memorial Hospital in Gilette, […]
How Vulnerable Are You?
By Bill Graham, Technical Marketing Specialist, GrammaTech Introduction The promise of static analysis is compelling but our most frequently asked question is, “Where do we start?” Security is a top-of-mind […]
Top 5 Cyber Security Tips Every Internet User Must Consider
Must use tips for every internet user By Anas Baig, Digital Security Enthusiast, Gaditek The process of evolution affects every living thing equally; from the predator to the preyed upon. […]