Cybersecurity and Compliance 1-2-3? Start With G-R-C
By John South, Senior Director of Global Threat Intelligence Development at NTT, Ltd. When an individual responsible for security, compliance and risk management in a corporation addresses these topics, the […]
Why You Should Use a VPN When Working With Cryptocurrencies?
Due to the increase in the hacking of Cryptocurrencies, it’s necessary for crypto users to use encryption tools. By Susan Alexandra, Contributing Writer, None It’s been two years since cryptocurrency […]
The Need for a Better Protection of Small Businesses
By Milica D. Djekic The small businesses are the most common way of enterprises bringing over half of the GDP to any economy worldwide. From such a perspective, it’s quite […]
Security Researchers Discover Massive Trend in Phishing Scams
Targeting Businesses 193% increase in PDF Phishing Detections indicate Phishing to still be a prime threat vector By Shawn Pope In Nuspire’s quarterly threat landscape report, three main vector datasets; […]
Cloud Security Essentials — Session Monitoring
By Morey Haber, CTO & CISO, BeyondTrust The near-perfect personal attack vector is “shoulder surfing.” If you are not familiar with the concept, it is literally a threat actor looking […]
Hidden and High Priority Threats
Understanding Destructive Objects By Tyson Whitten, Vice President of Global Marketing, ReversingLabs Are you confident in what you saw today? It’s a simple, yet important question that nobody in security […]
The cloud’s computing: identify – understand – secure
By Milica D. Djekic The cloud’s computing is not that new topic in computer science, so we would not deal with that as being somehow emerging. It’s something that lasts […]
The security’s challenges of an Internet of Things
By Milica D. Djekic The Internet of Things (IoT) is not that new concept beginning with these days. It’s more like the name of the current state being correlated with […]
Untethered Power Sourcing Could Hitch Devices to Additional Security
Spinning the cybersecurity story for device owners with a wireless spool. By Anamika Kumari, Content Writer, Allied Analytics LLP The invention of USB connect was revolutionary in its own. Ajay […]
Ransomware Is the Biggest Online Threat. Learn Who to Protect, or You’ll Hate Yourself Later
By David Balaban Previous years have shown us one important thing – ransomware is going to stay and get worse. When even the minor ransomware creators are making a lot […]
Why Cyber Security is Redefining SMEs’ Business Operations on the Cloud
By Mufassira Fathima, Content Writer, Allied Analytics LLP Modern-day IT infrastructures and data centers are revolutionized by the advent of technology and cloud-based services. The emergence of the cloud, as […]
Why compromised credentials are one of the biggest threats facing businesses today
By François Amigorena, CEO, IS Decisions As a business, there are few things worse than realizing you’ve become a victim of a serious cyber attack. The consequences can be dear, […]
Cyber Security and the Supply Chain: Strengthening the Weak Links
By Simon Taylor, VP Product at Glasswall Solutions In today’s cybersecurity climate, with high-profile hacks and data breaches constantly in the headlines, businesses are putting more effort than ever into […]
How Vulnerable Are You?
By Bill Graham, Technical Marketing Specialist, GrammaTech Introduction The promise of static analysis is compelling but our most frequently asked question is, “Where do we start?” Security is a top-of-mind […]
Top 5 Cyber Security Tips Every Internet User Must Consider
Must use tips for every internet user By Anas Baig, Digital Security Enthusiast, Gaditek The process of evolution affects every living thing equally; from the predator to the preyed upon. […]
Mirai Botnet
A Sign of DDoS to Come By Charles Parker, II; InfoSec Architect Attackers are always looking for new and novel methods of attack. These initially may be difficult to defend […]
How to save your critical data using smart backup procedures?
By Milica D. Djekic The disasters and discontinuities in work are not rare occurrences, so we should get ready to protect our vitally significant assets from any sort of loss […]
How to survive the cybersecurity expertise shortfall
By François Amigorena, CEO, IS Decisions Analysts everywhere are fretting about the lack of cybersecurity professionals across the world. The Cybersecurity Jobs Report believes the global shortfall of cybersecurity workers […]
THE GLOBAL CYBER SECURITY BATTLE
LAPTOPS WILL BE THE ARTILLERY OF THE FUTURE By David J. O’Reilly, Managing Director, Hampton Court Capital Every political and military conflict now has a cybersecurity aspect to it, which […]
Password security: It’s like sellotaping your house key to the front door…
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. Last month we saw Barack Obama’s final mic drop as President, Kim Kardashian’s finally stable and secure enough to get back into […]
The information sharing methods
By Milica D. Djekic The information could be shared through many different means and right here we would discuss how they can leak out from some organization using insider’s threat […]
IoT Devices Require Security-First Design
By Bill Graham, Technical Marketing Specialist, GrammaTech Introduction The Stuxnet malware was a wake-up call for embedded device security when it became public knowledge in 2010. Its sophistication and purpose […]
Tips to Help Boost the Security of Your MySQL Database
By Sujain Thomas, Security of Your MySQL Database, Remote DBA If you have been keen on database security news, you may have heard of the attacks on MySQL databases. The […]
Best Practices in Cyber Security for Businesses
By Tim Green Cybersecurity–information technology security–is the practice of protecting computers, applications, data, and networks from illegal access. From hacking to computer viruses, to phishing emails and calls, efficient cybersecurity […]
Three Tips to Avoid Going Phishing
By Travis Rosiek, CTO, Tychon It’s an old trick in the physical world. Getting into a secured building is easiest if an infiltrator can get an authorized person to open […]
The Fatal Danger Lurking in Today’s Fortune 500
By Tatu Ylonen, founder and SSH Fellow, SSH Communications Security It takes a special combination of leaders, ideas, and processes to become a Fortune 500 company. By the time an […]
Office Depot
Allegedly Creative Vulnerability Diagnosis By Charles Parker, II; InfoSec Architect Retailers do not have the most pleasant sets of responsibilities. There are pressures from the staff, management, corporate office, and […]
Shedding the Light on Deep Network Visibility for Cyber Intelligence Applications
DWDM is the backbone technology for optical networks but presents a challenge to government agencies with intercept responsibilities. By Mike Seidler, Senior Product Manager, NetQuest Corporation Dense Wave Division Multiplexing […]
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from […]
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory […]