In A World of External Threats, How Are Businesses Putting Themselves In Jeopardy?
By Stephanie Douglas, Senior Managing Director, Guidepost Solutions Just about every possible facet of your personal information can be subject to compromise: credit card or social security numbers, social media […]
How to Keep Your Customer’s Credit Card Information Safe
Strong cybersecurity goes without question By John Shin, Managing Direction, RSI Security Protecting customer data is closely related to delivering satisfying customer experience. An enjoyable meal in a beautiful restaurant […]
How to Suggest Your Manager to Invest into Cyber Defense?
By Milica D. Djekic The first personal computers would appear in the early 80s of the 20th century. Since then the entire technological posture has changed and evolved so rapidly, […]
How to Address the Top 5 Human Threats to Your Data
By Dave Sikora The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to protect. For most businesses today, that most valuable asset […]
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that […]
From Guards to Detectives: Evolving the Junior Security Analyst Role
By Mike Armistead, CEO and Co-Founder, Respond Software Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human roles with the support of intelligent […]
Detrimental Ransomware Effects
Lost coursework and headaches By Charles Parker, II Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828 students, aged between 11 […]
The ways of responding to a terrorist encryption
By Milica D. Djekic The encryption may get a crucially significant point in some communication or information exchange activities. It’s not only important to a Defense Force as it may […]
Facial Recognition: Killing the Password One Photo ID at a Time
By Stephen Stuut, CEO of Jumio In today’s complex cybersecurity landscape, the notion of utilizing a password to validate a The user’s authenticity is rudimentary. Cybercriminals can retrieve passwords in […]
Three Key Business Lessons From The Founder of a Big Data Security Company
By MacLane Wilkison, Co-Founder of ZeroDB When startups mix with corporations we see an oil-and-water effect. There’s often a gap in work practices, organizational structure, and managerial outlook, not to […]
E-Recycling: Exploring the “End-of-Life” Issues for Connected Devices
A brief digest from the E-Scrap Conference & Trade Show 2019 Orlando, FL – What happens to our beloved tech devices when they die? Wouldn’t it be great if the […]
Best Practices for Remote and Branch Office Data Protection
By Gregg Petersen, Regional Director, Middle East, and SAARC, Veeam Software We’ve all heard about fantastic new data center technologies, but all too often it looks like these technologies only […]
How a Cyber Attack Could Kill Your Website – Permanently
By Phillip Adcock, Managing Director, Shopping Behaviour Xplained Ltd Shopping online has become the standard way to do things. But with many shoppers wary of online services, site owners should […]
How to protect an enterprise from physical attacks
By Yana Yelina, Tech Journalist, EffectiveSoft Nowadays, none of the enterprises is immune to cyberattacks, data breaches, malware, and other types of damage. As a result, news about information leakage […]
Are your critical systems lying to you? Protecting SCADA Systems from Data Forgery
By Michael Shalyt, VP Product Aperio Systems (www.aperio-systems.com) Like many things in life, the greatest cyber threat to critical infrastructure is in the things we cannot see. Both security analysts […]
The anniversary of EMV roll-out: criminals are anxious to beat the system
By Andrei Barysevich Introduced by the financial industry in the early 2000s, EMV smart payment cards have largely supplanted magnetic stripe technology, and for good reason. Due to concerns surrounding […]
The independent wireless networks
By Milica D. Djekic The wireless technologies would actively attract the researcher’s attention during the last few decades. The era of wireless information transfer has begun around two centuries ago […]
A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
By David Barton, Chief Information Security Officer, Forcepoint At the height of merger-mania, eager participants frequently viewed cybersecurity as an afterthought. “Let’s just make this acquisition work,” they’d reason, “and […]
The reasons to catastrophical events within a critical infrastructure
By Milica D. Djekic Many would believe that the reasons for catastrophic events within any industrial infrastructure could be based on skillfully prepared hacker’s attacks. Basically, that’s the case with […]
The Great Tech Transfer—A Success Story in Innovation
By John Shearer, Co-Founder, and CEO, DarkLight Solving business challenges often requires innovation, but fostering creativity and growing new technologies is a challenge in itself. Creating new services and products […]
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your […]
Even NASA Has Issues!
Listed Vulnerabilities Need to be addressed By Charles Parker, II; Cybersecurity Lab Engineer From a young age, we become acquainted with NASA through its missions to the Moon, Mars, Saturn, […]
Genesee County Systems Pwned!
Systems Down By Charles Parker, II; Cybersecurity Lab Engineer There are vast numbers of municipalities of various sizes adjacent to each other throughout each state in the nation. Each of […]
Investing In SIEM: How Your Business Can Improve Threat Detection and Response
By Chester Avey, Cyber Security Specialist, Independent. Despite continual advancements in security technologies to protect businesses from cyber threats, there remains no silver bullet to completely prevent breaches. And that’s […]
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new […]
The Myths You Shouldn’t Believe
By Sebastian Schaub, CEO, Hide.me There is a lot of information on the web regarding VPNs along with a wide and varied selection of VPN services to choose from. With […]
Security in Orbit: Addressing the Current State of Satellite Security
By Geoff Pierce, Chief Information Security Officer, Centauri With 5G finally starting to roll out across the country, the anticipation for new IoT applications continues to build. With that anticipation […]
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both […]
The Malware Research Insights
By Milica D. Djekic The malware by itself is any piece of malicious code that is capable to cause damage to the current IT configuration. The malicious applications could function […]
Slow Response Times to Blame for Phishing Attack Success on Organizations
By Atif Mushtaq, CEO, and founder, SlashNext Phishing poses a looming vulnerability for many enterprises today because the attackers have upped their game. They can now set up and take […]