8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report […]
How to Know If Someone Is Watching You on Your Camera
In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist, SEOforX In this era of video […]
How to Stay Safe on Public Wi-Fi Networks (Detailed Guide)
Connecting to public networks is easy but staying safe on these networks is not easy as we think! Here are some tips to stay safe on public hotspots. By Susan […]
It’s Time for A Tough Conversation About Trust
By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks, […]
Multifactor Authentication & The Sobering Reality for Organizations Without It
By François Amigorena, CEO and founder, IS Decisions Organizations without multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. Compromised credentials are […]
The Only Recession in Cybersecurity
Sleep-deprived, overworked and fatigued security professionals impose huge risks to an organization By Karl Sharman, Vice-President, BeecherMadden Tired, overworked and fatigued employees pose huge risks to organizations. It’s obvious to […]
The Internet Got Safer In 2019: A Cybersecurity Year in Review
By Daniel Kanchev, Chief Enterprise Architect, SiteGround It’s just a fact: In 2019 the Internet got safer by default. SSL encryption adoption is now at an all-time peak, with the […]
Visibility and Anomaly Detection in The Age of Iot
By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the […]
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities and local governments in Texas were hit by a coordinated ransomware attack. The hackers […]
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
Applying Security Across Heterogeneous IT Systems
Proactive Threat Interference® provides protection not offered by other cybersecurity approaches By Steve Ryan, CEO & Co-Founder, Trinity Cyber, Inc. Do I patch my system in the name of security, […]
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity […]
How to Stop Cybersecurity Attacks before They Start
By Dr. Johannes Bauer, principal security advisor, identity management & security, UL Cybersecurity breaches are part of the nasty reality of today’s IT infrastructure and even though they are not […]
Stressing Security Teams
By Jody Caldwell Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly complicated. People stress out when they believe that demands […]
New Cybersecurity Trend: Hackers Impersonating Other Hackers
By Jonathan Drake, Senior Intelligence Analyst at Optiv Security Cyber threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary from organization to organization, typical threat […]
In A World of External Threats, How Are Businesses Putting Themselves In Jeopardy?
By Stephanie Douglas, Senior Managing Director, Guidepost Solutions Just about every possible facet of your personal information can be subject to compromise: credit card or social security numbers, social media […]
Belfast – The New Hotbed for Cybersecurity Talent
By Olivier Vallez New York, NY – Like many people, my perception of Northern Ireland conjures images of dreary weather, stone thatched houses, and when it comes to industry, perhaps […]
A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
By David Barton, Chief Information Security Officer, Forcepoint At the height of merger-mania, eager participants frequently viewed cybersecurity as an afterthought. “Let’s just make this acquisition work,” they’d reason, “and […]
Six Reasons to Rethink Secure Remote Access
By Etay Bogner, VP, Zero-Trust Products, Proofpoint Whether you are the IT manager of a growing startup company or a midsize enterprise, you have probably already faced the increasing demand […]
High Schools Are Not Exempt From Attack
San Diego USD By Charles Parker, II; Cybersecurity Lab Engineer High schools are much like universities and colleges, in that these hold a mass amount of data which may easily […]
Genesee County Systems Pwned!
Systems Down By Charles Parker, II; Cybersecurity Lab Engineer There are vast numbers of municipalities of various sizes adjacent to each other throughout each state in the nation. Each of […]
Investing In SIEM: How Your Business Can Improve Threat Detection and Response
By Chester Avey, Cyber Security Specialist, Independent. Despite continual advancements in security technologies to protect businesses from cyber threats, there remains no silver bullet to completely prevent breaches. And that’s […]
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new […]
The Myths You Shouldn’t Believe
By Sebastian Schaub, CEO, Hide.me There is a lot of information on the web regarding VPNs along with a wide and varied selection of VPN services to choose from. With […]
Effectively Using Email Authentication Standards for Stronger Message Integrity
By Jeff Stein, Information Security Architect, Reputation.com Once known as electronic mail and used for simple but near-instantaneous communication between computers, email has evolved to be used for a variety […]
Security in Orbit: Addressing the Current State of Satellite Security
By Geoff Pierce, Chief Information Security Officer, Centauri With 5G finally starting to roll out across the country, the anticipation for new IoT applications continues to build. With that anticipation […]
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both […]
The Malware Research Insights
By Milica D. Djekic The malware by itself is any piece of malicious code that is capable to cause damage to the current IT configuration. The malicious applications could function […]
Benefits of Conducting Crown Jewels Analysis
The main goal is to identify mission-critical cyber assets, but there are additional benefits… By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. Crown Jewels Analysis is a MITRE methodology […]