Tesco Bank
Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as […]
Nation State Cyber Attacks Emerge from the Shadows
By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information […]
PART II: DEFENDING YOUR AIRSPACE
WIPS vs. WIDS By Ryan Orsi, Director Product Management, WatchGuard Technologies In part one of this series: The Anatomy of a Wi-Fi Hacker, we addressed the ever-growing need for a […]
Part I: The Anatomy of a Wi-Fi Hacker in 2019
By Ryan Orsi, Director Product Management, WatchGuard Technologies We all know the use of Wi-Fi is pervasive because people crave a constant digital connection. So much so, that they’ll spend […]
Time to Get Serious About Internet of Things Cyber security
By Nate Lesser, Managing Director of MasterPeace LaunchPad The Internet of Things (IoT) is made up of everyday objects built with the ability to sense, analyze, and communicate information about […]
Cyber Security Risks on Social Media
By Simon Parker at Minerva Security As technology advances, social media has gained popularity over time. It has provided a platform where people can freely express their feelings and get […]
The Human in the Middle
Behavioral Design for Cybersecurity By Alex Blau, Vice President, ideas42 In this ever-maturing digital era, using technology to solve our everyday problems feels like an obvious thing to do. Yet, […]
Phishermen
How Insider Threats are Realized By Daniel Jetton, VP Cyber Services, OBXtek, Inc. While technical security problems can be dealt with through technical solutions, people must be approached in a […]
Armor’s Black Market Report Finds Hackers Selling Cash for Pennies on the Dollar, Credentials for RDP Servers (a Popular Entry Point for Ransomware), and Articles of Incorporation
Today, cloud security-as-a-service provider Armor, released its annual Black Market Report. The report finds that the underground hacker markets and forums, where financial data and personal information is bought and […]
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to […]
How the Internet of Things Could Compromise Online Security
By Chris Usatenko, Content Creator, EveryCloud The concept of an Internet of Things has been a dream held by many tech geeks. Up until a few years ago, though, the […]
5 Key Differences between Software and Hardware Vulnerability Mitigations
By Anders Fogh, Senior Principal Engineer at Intel The software stack has long been a fruitful target for hackers looking to exploit organizations – and this is not likely to […]
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for […]
New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom
Another US city was the victim of a ransomware attack, this time crooks hit the city of New Bedford, Massachusetts, asking for $5.3 Million Ransom, but… The systems of New […]
Understanding Application Risk Management
By Haythem Hammour, Product Marketing Manager, Brinqa On April 25, Docker®[1] discovered a breach of unauthorized access to a single Docker Hub database storing a subset of non-financial user data. […]
Have You Asked your eDiscovery Vendor
These 6 Essential Data Security Questions? By Brian Schrader, Esq., president, and CEO, BIA In today’s world of ever-increasing data theft, network hacks and other cyber threats, companies of all […]
Attracting and Retaining Staff for a Fusion Center
The best way to collaborate talent within a security eco-system By Karl Sharman Fusion Centers were formed following the devastating 9/11 terrorist attacks in New York and now mainly form […]
Artificial Intelligence-Driven Situational Awareness
By Milica D. Djekic Once you get into the new environment you would begin digging in the darkness trying to figure out what is happening there. Maybe you would cope […]
US cyberattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf
The United States cyber army carried out a cyberattack in June on a database used by Iran’s Islamic Revolutionary Guard Corps to plot attacks on oil tankers in the Gulf. […]
The Need of Automatics and Control in Incident Response
By Milica D. Djekic The incident response as a cyber defense active measure could require the highly skillful IT security professionals who should get capable to detect, handle and mitigate […]
August Patch Tuesday
Take Advantage of Your August Patch Tuesday Break By Chris Goettl, Director of Product Management, Security, Ivanti August Patch Tuesday was a pleasant relief after the massive release of updates […]
Why “Cloud Security 101” Isn’t So Simple After All
By Josh Stella, co-founder, and CTO of Fugue The term “cloud misconfiguration” may not seem like an adequate term to describe the leading cause of cloud data breaches. It connotes […]
5 Most Disastrous Ransomware Attacks of the Last Decade
In the past few years, we have seen a massive change in the hacking industry. Let’s take a look at the most dangerous ransomware attacks and how to stay safe […]
4 Industries Being Hurt by Counterfeit Materials (And How to Spot Them)
By Kayla Matthews There are many industries with a lot to lose when it comes to counterfeit parts and materials. Today, we’ll talk about four of them. The dangers are […]
State Cyber security Regulation: Another Patchwork Approach?
By Jami Mills Vibbert with Venable LLP Until recently, state oversight of cybersecurity has been relatively limited. Indeed, although 48 of 50 states have laws related to data breach notification, […]
Lazarus: Data Leakage With Cryptographic System
By Rodrigo Ruiz & Rogério Winter You have most probably already received the recommendation or even the imposition of keeping a “strong password” in your applications. A strong password is […]
5 ways small businesses can be affected by a cyber security breach
By Asher de Metz A large-scale cybersecurity breach is hugely damaging for any organization, and with hackers becoming increasingly sophisticated, the chances of getting caught out are constantly growing. No […]
Reducing the attack surface: how to empower your staff while keeping your network secure
By Pascal Bergeot is CEO of Goverlan Goverlan’s Pascal Bergeot considers what the recent Google Document hit means for remote workers and advises what companies need to do to reduce […]
WannaCry ‘Remedies’: The Second Wave of Attacks
By Fernando Cuervo, Detect Monitoring Service Leader, Easy Solutions Since May 12th, over 200,000 victims in 150 countries have been hit by a massive, international ransomware cyber attack called WannaCry. […]
Mastercard data breach affected Priceless Specials loyalty program
Mastercard disclosed a data breach that impacted customer data from the company’s Priceless Specials loyalty program. The American multinational financial services corporation notified the data breach to the German and Belgian Data […]