Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes […]
Cyber Literacy in Post-Digital Era as Part of National Security
By Aliaksei Hapeyeu, master’s degree student from Shandong University Cyberspace in the post-digital era has become not only a tool, but also a domain where people live, work, and relax. […]
Cyber Warfare and Its Impact on Businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic
By Carolyn Crandall, Chief Deception Officer, Attivo Networks One of the most popular targets for attackers, cybercriminals, and other bad actors is east/west network traffic. This is network traffic that […]
HIPAA Compliance and The Protection of Cyber Security
By Andrew Mikhailov, CTO at Zfort Group Businesses face the risk of severe cyber-attacks – the present-day cyberspace criminals are well-organized, thoughtful, and marketable. And one of the most sensitive […]
Why Academic Openness and A Rise in Online Classes Should Invoke A Renewed Focus on Security
By Anthony Bettini, CTO, WhiteHat Security For decades, researchers and students from around the world have come to study and collaborate, research, and innovate at American universities and colleges under […]
TLS/ SSL Decryption – One of the Main Pillars of Zero Trust Model
By Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks In a world where everything and everyone is connected to the internet, in one way or another, […]
Looks Like Russian Hackers Are on An Email Scam Spree
By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]
Why Are Fully Staffed Cybersecurity Teams Unable to Keep Up with Hacks?
By Steve Salinas, Head of Product Marketing, Deep Instinct Faced with mounting cyber threats, large enterprises are devoting more resources than ever to improving their cybersecurity posture. According to a […]
Security in The New Normal Requires an Agile Approach
By Danny Presten, Chief Methodologist at Digital.ai Phishing attacks are up 600%, ransomware attacks have increased 148%, and the FBI has reported a 300% increase in cybercrimes. Cybercriminals are stepping […]
4 Simple Ways to Repel Ransomware as The Rise in Remote Work Continues
By Kris Lahiri, Co-founder and Chief Security Officer of Egnyte Ransomware attacks are now the most common security incident taking place today. According to a recent report from TrustWave, ransomware […]
Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce
By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential […]
Cyber Warfare and its impact on businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments, and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
Cybersecurity Challenges When Working from Home
By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in […]
COVID-19 And Security Team Cuts Are Costing Businesses in Cyber and Financial Risks
By Samantha Humphries, security strategist, Exabeam With 71% of cyber professionals reporting increased threats since the COVID-19 pandemic started, are SOCs prepared to mitigate these threats? The Exabeam 2020 State […]
Security by Design: How to Protect the Future of Business
By Jim Zuffoletti, CEO & co-founder of SafeGuard Cyber Estimates suggest that by 2021, cybercrime will cost the world $6 trillion every year. This will constitute “the greatest transfer of […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud
By Robert Prigge, CEO of Jumio Passwords will become extinct much faster than predicted. As the COVID-19 pandemic pushed more of us to self-isolate, Zoom became the go-to teleconferencing platform. […]
A Passwordless Future: Will Biometric Identification Replace Passwords?
By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]
How to Maintain Anonymity in Communications?
By Milica D. Djekic The kids would love to play the games. They would not be attracted to the computer’s games only, but rather with some being so creative, engaging, […]
Iphone Extraction Without A Jailbreak
Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]
Cyber Attacks at Sea: Blinding Warships.
Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the […]
Benefits of A Security Operation Center (SOC)
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt The creation of a Security Operations Center (SOC) has increasingly stood out as something necessary to help companies defend themselves against damage caused by cyber-attacks. […]
Returning to the Office After COVID-19: A Checklist for Business
As countries, states, and cities begin to ease lock-down restrictions, this checklist for reopening the office can help you jump start your return. You and your team have been quarantined […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and Route These “Below the Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]
Women’s Health and Safety Amidst COVID-19 Cybercrime
By Sarah Katz, Senior Cyber Security Analyst, NASA Ames Research Center As the past two months have seen the COVID-19 pandemic sweep the globe, domestic violence has spiked across multiple […]
Newsjacking COVID-19 and Other Common Cybersecurity PR Mistakes
By Evan Goldberg, SVP and Cybersecurity Practice Group Director, ARPR If you were to reflect back to the beginning of the previous decade, you’d be hard-pressed to remember more than […]
Managing an Information Security Risk Program
A Managerial Approach By Adriano Novaes, Senior Cybersecurity Consultant Every organization should have an information security management program. The program consists of the totality of all activities and expenditures the […]