How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters

By Don Boxley, co-founder, and CEO, DH2i [https://dh2i.com] Cybersecurity researchers at the independent security research group JSOF recently discovered at least 19 security vulnerabilities that are found at the base […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters

Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

By Joanne Godfrey, Security Evangelist, ZeroNorth Companies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

Industrial Control System – Security Focus of Federal Effort

By Trip Hillman, Director of Cybersecurity Services at Weaver More and more, industrial control systems have been the targets of malware, ransomware, and other kinds of cyberattacks. These attacks jeopardize […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Industrial Control System – Security Focus of Federal Effort

Looks Like Russian Hackers Are on An Email Scam Spree

By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Looks Like Russian Hackers Are on An Email Scam Spree

Getting Employees Back to the New Normal

Work will never be quite the same once the pandemic has passed By Brendan O’Connor, CEO, and Co-founder, AppOmni There are encouraging signs that the Covid-19 pandemic – arguably the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Getting Employees Back to the New Normal

Is What’s Lurking in Your Network About to Come Out?

The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. By Carolyn Crandall, Chief Deception Officer, Attivo Networks The COVID-19 pandemic has forced countless […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Is What’s Lurking in Your Network About to Come Out?

How To Grow Your Cyber Expertise During A Pandemic

By Bradley Hayes, Chief Technology Officer at Circadence IT pros can still learn new skills despite perceived barriers to progressing professionally during the pandemic. While working circumstances and environmental factors […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on How To Grow Your Cyber Expertise During A Pandemic

CRYPTO

An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on CRYPTO

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X