How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that. […]
The Consumer Technology Association – What Trends Lie Ahead in the 2020’s
If one thing was made boldly apparent at the CES 2020, it’s that everything is trending toward connectivity. Soon, there will be scarcely any facet of our daily lives that […]
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal […]
Secure Passwords are not Always Secure
Just because it meets the complexity test does not mean it is secure. By James Gorman, Lead Writer and Staff Reporter Cyber Defence Media Group Most of the insider threats and […]
Privacy – A misunderstood issue
By Michael J. Nash Introduction Living in a modern, interconnected world brings enormous benefits. The most obvious is that the speed of communication and information sharing has opened up new […]
Accelerating the Pace of Government IT Modernization
By Jeff Elliott For decades, the federal government has been hamstrung in its efforts to adopt new IT systems by the glacial pace of RMF accreditation and the manual processes […]
How to Address Multi-Cloud Security
By William Klusovsky, CISSP, CISM,NTT Ltd. Networks for our businesses are not as simple as they used to be. With the evolution of cloud environments and the multitude of “everything […]
Conquering the Cyber Security Challenges of The Cloud
By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing economies of scale and breakthrough technological advances to modern organizations, but it is more […]
AttackIQ 2020 Predictions
By Christopher Kennedy, CISO and VP of Customer Success, AttackIQ 2020 Election Security Insecurity: Election security will be an open wound that can’t be healed in time for the 2020 […]
Bitglass 2020 Predictions
By Anurag Kahol, CTO and co-founder, Bitglass We will see an increase in the number of M&A deals in 2020. In fact, 79 percent of respondents to Deloitte’s M&A trends […]
ForgeRock 2020 Predictions
By Ben Goodman, SVP at ForgeRock and CISSP 2020 Will be the Beginning of the End of Passwords. Consumers already log in to dozens of protected resources everyday: from email, […]
CEO Action for Diversity & Inclusion™ Coalition is Trailblazing the Path to Workplace Integration!
Las Vegas, NV – Issues of prejudice and bias in the workplace are making headlines across the country. The national discourse on these topics are reaching a fever pitch, and […]
ForgeRock 2020 Predictions
By Eve Maler, Interim CTO, ForgeRock Healthcare patients will be able to share and redact their data in 2020. 2020 will be the year healthcare IT moves from data privacy […]
2020 Industry Predictions
By Peter Goldstein, CTO, and co-founder, Valimail Email security will prove to be the weakest link in election security. Email is implicated in more than 90 percent of all cybersecurity […]
Seven Security Predictions for 2020
By Corey Nachreiner Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions for the coming year. […]
US Military Veterans Targeted By Online Scams
After Years of Vigilant Service, US Veterans must remain Vigilant Online and Guard their Home like US Marines Guard the President of the United States (POTUS) US Veterans are twice […]
Anomaly Detection Is the Next Cybersecurity Paradigm
It’s time to move beyond static lists of things forbidden and things allowed. By Aron Hsiao, Director of Marketing and Insights, Plurilock Static lists have long been at the heart […]
Fraud: A Look Back At 2019 And What to Expect in The New Year
By Christina Luttrell, IDology The approach of the new year is a good time to reflect on the fraud landscape and its impact on businesses and consumers. Fraudsters continue to push […]
How To Build A Career In Cyber Security
By Pedro Tavares Nowadays, cybersecurity is seen as an attractive landscape for ambitious people and a truly great opportunity to fight cybercrime. During the past few months, many cyberattacks have […]
Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions […]
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view […]
Iot Security and Privacy
Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age […]
Europe Cybersecurity Market Size to Steer At 13% CAGR To 2025
Europe Cybersecurity Market is estimated to be over USD 25 billion in 2018 and is expected to register a lucrative growth between 2019 and 2025 with a CAGR of over […]
The Ultimate Guide to SSL/TLS Decryption
Six Features to Consider When Evaluating SSL/TLS Inspection Solutions By Babur Khan, Technical Marketing Engineer, A10 Networks Encrypted traffic accounts for a large and growing percentage of all internet traffic. […]
8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report […]
How to Know If Someone Is Watching You on Your Camera
In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist, SEOforX In this era of video […]
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling […]
What’s the Security Misconfiguration Antidote? Automation.
By Joshua Williams, Senior Cloud and Automations Solutions Engineer, FireMon The collective security community is spending too time much worrying about vulnerabilities. They need to shift some of those resources […]
The Dark Truth of Insider Threat
By Richard Menear, CEO, Burning Tree In any business, we inherently want to trust the people we work with. By and large, we can. However, the reality is that insiders […]
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management […]