Looks Like Russian Hackers Are on An Email Scam Spree

By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Looks Like Russian Hackers Are on An Email Scam Spree

Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

Cybersecurity Challenges When Working from Home

By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cybersecurity Challenges When Working from Home

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud

By Robert Prigge, CEO of Jumio Passwords will become extinct much faster than predicted. As the COVID-19 pandemic pushed more of us to self-isolate, Zoom became the go-to teleconferencing platform. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud

A Passwordless Future: Will Biometric Identification Replace Passwords?

By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on A Passwordless Future: Will Biometric Identification Replace Passwords?

Iphone Extraction Without A Jailbreak

Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Iphone Extraction Without A Jailbreak

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X