Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
How We Securely Share Data in A Remote World
By Duncan Greatwood, CEO, Xage Security Cybersecurity solutions are often thought of as a single-issue solution: protecting companies from dangerous or costly hacks, or detecting hacks after they’ve already happened, […]
Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps
By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the […]
Making the Journey to the Intelligent SOC
AI, Machine Learning, and Open-XDR Make it Easier By Albert Zhichun Li, Chief Scientist, Stellar Cyber Most enterprises and service providers are building security operations centers (SOCs) where a team […]
Amidst Election Noise, Cybercriminals See an Opportunity with Retail
By Chris Kennedy, CISO & VP of Customer Success, AttackIQ More than seven months into the onset of the novel coronavirus, it feels strange to look back on the things […]
The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year
By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to […]
Data Migration Security
What to Know By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
How Are Financial Services Firms Addressing the Requirements of Digital Transformation, Security, And Compliance?
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks The financial services sector is experiencing significant commercial disruption coupled with rapid innovation as established institutions strive to […]
Telegram for Business Communications: Understanding The Risks And Rewards
By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge
By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively […]
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]
Unlocking the Promise of Packet Capture
By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]
The One-Stop Spear Phishing Defense Guide You Will Ever Need
By Jeff Penner, Senior Manager at ActiveCo Technology Management. Is your business ready to combat spear phishing attacks? It’s a question that gives many seasoned CTOs bad jitters. The truth […]
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations […]
Emotet Attacks Surge in 2020, but Could Be Prevented
By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]
Takeaway from the SANS Institute Attack: Without Proper Care, “Consent Phishing” Can Happen to Anyone
Gamified Training for Security Teams Can Raise Vigilance and Advance Skills to Defend Against the Latest Attack Exploits. By Chloé Messdaghi, VP of Strategy, Point3 Security The SANS Institute, established […]
No Meows Is Good News: Proactive Nosql Database Security in The Era of Meow Attacks
By Jack Harper, Director of Professional Services at Couchbase This summer, a spate of cyberattacks in which cybercriminals targeted internet-connected ElasticSearch and other unsecured databases continued to fuel concerns about […]
The Impact of Ransomware on Cloud Services and How to Stop Attacks
By Davit Asatryan, Product Manager, Spin Technology Cloud technology and services continue to gain popularity due to their ability to allow businesses to cut costs, improve an outdated IT infrastructure, […]
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people […]
Why Cybersecurity Awareness is More Important During COVID-19
Do you know the need for cybersecurity training for your organization? If not, learn more about the importance! By Susan Alexandra, Contributing Writer Cyber-attacks, malicious activity, and phishing scams have […]
3 Educational Cyber Security Steps for The Protection of Your Personal Data
By Ankit Rajpurohit Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen […]
4 Reasons Why Cyber Security Is Important in Your Business
By Gabe Nelson, Content Specialist, Bonus.ly Cyber-attacks are incredibly common and anyone can fall victim to them. Cyber-attacks can cause electrical blackouts, failure of military equipment, and breaches of national […]
Why Endpoint Protection Should Be a Security Priority
Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]
The Serverless Security Machine
By Art Sturdevant, Director of Operations, Censys Servers are bullshit. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]
The Limitations of SASE and Zero Trust
By Jayant Shukla, CTO, and Co-Founder, K2 Cyber Security Over the past several years, two industry buzz terms have really started to gain traction. SASE (Secure Access Service Edge) was […]
FIRST launches new code of ethics for incident response and security teams on Global Ethics Day
By Shawn Richardson, Ethics SIG co-Chairs of FIRST. October 21, 2020 – following a global consultation, the Forum of Incident Response and Security Teams (FIRST) is launching new ethics guidelines […]