Cybersecurity: Innovation Needed

Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Cybersecurity: Innovation Needed

Top 10 Data Breaches of the 21st Century

This article looks into the biggest data breaches of the 21st century (so far!). By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Top 10 Data Breaches of the 21st Century

A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications

By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications

For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge

By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

Unlocking the Promise of Packet Capture

By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Unlocking the Promise of Packet Capture

The Serverless Security Machine

By Art  Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Serverless Security Machine

Cybersecurity Best Practices for End Users

By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Cybersecurity Best Practices for End Users

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Emotet Attacks Surge in 2020, but Could Be Prevented

By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Emotet Attacks Surge in 2020, but Could Be Prevented

Data Migration Security

WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Data Migration Security

Perfecting Your Cybersecurity Sales Process

By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Perfecting Your Cybersecurity Sales Process

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X