Cyber Security Patent Lawsuits on The Rise and The Need for Shared Innovation in Cyber Security
By Keith Bergelt, CEO of Open Invention Network (OIN) According to the FBI’s Internet Crime Complaint Centre, by June of 2020, daily digital crime in the U.S. had risen by […]
3 Steps to Reimagine Your AppSec Program
By Jake Reynolds, Product Manager at NetSPI and Nabil Hannan, Managing Director at NetSPI With Continuous Integration/Continuous Deployment (CI/CD) increasingly becoming the backbone of the modern DevOps environment, it’s more […]
Are Your Corporate Networks Ready for An Impending ‘Return to Work’ Cyber Attack?
As employees rejoin the network, cyber risks are heightened. Why it’s important to have essential security measures in place before it’s too late. By Stephen Burke, Cyber Risk Aware CEO […]
Election Integrity Is A Moving Target, But It’s Essential to Pursue
Measures to improve voting security need to start long before election day itself By Craig Hinkley, Chief Executive Officer, WhiteHat Security, a wholly-owned, independent subsidiary of NTT Ltd. U.S. […]
Cyber Liability Insurance – Safe Bet or Sales Gimmick?
By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we see more stories about companies overtaken by this type of cyberattack. Garmin and Canon, […]
Mapping Automation to the MITRE ATT&CK Framework
By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative, both […]
Manual vs. Automatic Cybersecurity Testing: What’s the Difference?
By Tamir Shriki, Customer Operations Manager, XM Cyber In the context of cybersecurity, if you want to protect something, you need the ability to test its defenses. It’s the only […]
How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters
By Don Boxley, co-founder, and CEO, DH2i [https://dh2i.com] Cybersecurity researchers at the independent security research group JSOF recently discovered at least 19 security vulnerabilities that are found at the base […]
Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy
By Joanne Godfrey, Security Evangelist, ZeroNorth Companies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But […]
Do Not Forget to Securely Lock Your Data in Microsoft Teams
By Johanna Reisacher, Marketing Manager, Secomba GmbH More and more employees work from home. As a result, in the last months the demand for Microsoft products, especially Microsoft Teams, has […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes […]
Protecting a Mobile Workforce with Hybrid DNS Security
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox The future of the workplace is undoubtedly a remote workforce, accessing the corporate network via mobile devices and the […]
Cyber Literacy in Post-Digital Era as Part of National Security
By Aliaksei Hapeyeu, master’s degree student from Shandong University Cyberspace in the post-digital era has become not only a tool, but also a domain where people live, work, and relax. […]
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on […]
Industrial Control System – Security Focus of Federal Effort
By Trip Hillman, Director of Cybersecurity Services at Weaver More and more, industrial control systems have been the targets of malware, ransomware, and other kinds of cyberattacks. These attacks jeopardize […]
There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic
By Carolyn Crandall, Chief Deception Officer, Attivo Networks One of the most popular targets for attackers, cybercriminals, and other bad actors is east/west network traffic. This is network traffic that […]
Covid-19 Unveiled a New Security Gap
By Eddy Bobritsky, CEO & Co-Founder, Minerva Labs As COVID-19 spreads, more organizations are enforcing remote work from home, making employees home computers more vulnerable than ever to cyberattacks. The […]
Smart Gadgets in Proving Workplace Violence
By Milica D. Djekic The violence at the workplace could start as the common insult, continue as the verbal abuse and end up as the mobbing attack that could get […]
Is API Usage Putting Your Organization Out of Compliance?
By Matt Keil, Director of Product Marketing, Cequence Security APIs (“Application Programming Interfaces”) are increasingly being used as the conduit for data exchange between applications, infrastructure, and IoT devices. The […]
Build Your AI Incident Response Plan… Before It’s Too Late
By Patrick Hall* and Andrew Burt** * Patrick Hall is a principal scientist at bnh.ai, a boutique law firm focused on AI and analytics, and an adjunct professor in the […]
Looks Like Russian Hackers Are on An Email Scam Spree
By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]
Getting Employees Back to the New Normal
Work will never be quite the same once the pandemic has passed By Brendan O’Connor, CEO, and Co-founder, AppOmni There are encouraging signs that the Covid-19 pandemic – arguably the […]
Ransomware, Risk, And Recovery
Why You Need to Take A Hard Look At Your Corporate Recovery Plan By Mickey Bresman, CEO, Semperis What we as IT and security professionals worry about when planning […]
4 Simple Ways to Repel Ransomware as The Rise in Remote Work Continues
By Kris Lahiri, Co-founder and Chief Security Officer of Egnyte Ransomware attacks are now the most common security incident taking place today. According to a recent report from TrustWave, ransomware […]
Is What’s Lurking in Your Network About to Come Out?
The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. By Carolyn Crandall, Chief Deception Officer, Attivo Networks The COVID-19 pandemic has forced countless […]
How To Grow Your Cyber Expertise During A Pandemic
By Bradley Hayes, Chief Technology Officer at Circadence IT pros can still learn new skills despite perceived barriers to progressing professionally during the pandemic. While working circumstances and environmental factors […]
CRYPTO
An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
Post COVID-19: Cloud, Remote Work and BYOD Security Predictions
By Anurag Kahol, CTO and co-founder, Bitglass Cloud adoption has already been growing rapidly, but we’ll see a sharp increase in adoption in 2020 as a result of the global […]