Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio
When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy…
Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams
IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS…
Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas
Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event…
An Internet of Things Future Means Securing Entire Supply-Chains
By Nils Gerhardt, Chief Technology Officer for Utimaco The ‘Internet of Things’ (or IoT) is far more than smart speakers and app-connected lightbulbs: in less than a decade it has…
Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to be fought on two fronts – on the ground and in the ether –…
Improve Data Security Through Automation
Human error is endemic to data breaches. Process automation can minimize the risk. By Gregory Hoffer, CEO, Coviant Software Human error is the most common cause of a data breach,…
Top 10 Node.Js Security Best Practices
Best Security Practices in Nodejs By Harikrishna Kundariya, CEO, eSparkBiz Node.js is one of the most popular frameworks for web and mobile application development. It is JavaScript runtime which works…
Credential Stuffing; Ny Attorney General Reveals More Than 1.1m Compromised Accounts Discovered
Password-Guessing Is the Attackers’ Latest Weapon of Choice By Ekaterina Khrustaleva, Chief Operating Officer, ImmuniWeb In January 2022, the New York Attorney General Letitia James revealed the results of major…
Why Now Is the Time to Prepare for The Quantum Threat
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start preparations for the quantum threat today? By Ali El Kaafarani, CEO &…
The Truth About Data Privacy in Healthcare
Realizing the value of personal data and the risk of connected healthcare as bad actors prevail in their attacks against Healthcare Delivery Organizations (HDOs) By Samuel Hill, Director of Product…
The Seven Deadly Sins of Blockchain Security
By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology (DLT) is essentially an improved method of record-keeping, one which achieves a consensus shared…
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat Landscape You can’t ignore the headlines. From the Irish health service to…