Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

Getting Started with Active Directory Security

Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Getting Started with Active Directory Security

Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

Thanks to the rise of machines and shift towards zero-trust security, organizations’ security will require a new type of identity management By Murali Palanisamy, chief solutions officer, AppViewX   The […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine

While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine

December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are Straight Out of Science Fiction

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks When it comes to predicting the future, the science fiction genre has taken some big swings over the years. Unfortunately, it’s […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are Straight Out of Science Fiction

How To Effectively Secure Connected Devices

By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on How To Effectively Secure Connected Devices

December 2021: Cyber Deception Month

How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Which I shortened for you… https://tinyurl.com/CDMG-DEC-2021  (you can trust me, I’m […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on December 2021: Cyber Deception Month

Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and Cisco. Threat actors are exploiting a recently addressed server-side request forgery (SSRF) […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

SOAR Into More Integrated Cybersecurity

By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being cybersecurity compliant not the same as preparedness for threats? Shouldn’t compliance mean full […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on SOAR Into More Integrated Cybersecurity

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X