Cyber Attacks at Sea: Blinding Warships.
Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the […]
Digital Healthcare: How Secure Is the Care Data?
By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing, […]
The Devil Inside
Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]
New Expectations for the Network Perimeter
Patchwork network of legacy solutions won’t keep bad actors out By Barrett Lyon, Co-founder, and CEO, Netography U.S. government agencies are placing increased importance on cross-network visibility for cloud and […]
Managing an Information Security Risk Program
A Managerial Approach By Adriano Novaes, Senior Cybersecurity Consultant Every organization should have an information security management program. The program consists of the totality of all activities and expenditures the […]
Mobile App Security in The Midst of a Pandemic
By Tom Tovar CEO and co-creator of Appdome In the “new normal” of COVID-19, businesses are relying on mobile apps to ensure business operations and revenue flowing. Restaurants, grocery stores, […]
ISF: Behavioral Analytics Expected to Trigger a Consumer Backlash
Organizations whose business model is dependent on behavioral analytics will be forced to backtrack on costly investments BY Steve Durbin, Managing Director, Information Security Forum In the coming years, organizations’ […]
The Stats on Cyber Security Perception Heading into the COVID-19 Challenge
By Stephen Stott, Founder & CEO, Stott, and May There is a lot of debate currently around whether the cybersecurity profession is recession-proof. Answering that question largely depends on board […]
Cybersecurity Education and Practice: Never Stop Learning
By Ken Sigler, Dan Shoemaker, and Anne Kohnke As the number of industries, organizations, and educational institutions continue to recognize the scope and impact of cybersecurity, the means in which […]
Cybersecurity Strategies That Protect Business Operations Now and Tomorrow
Planning for the future means moving secure remote access toward the top of your list By Leo Taddeo, Chief Information Security Officer, Cyxtera Technologies and President, Cyxtera Federal Group In […]
How To Manage Your Small Business In Time Of Crisis
By Milica D. Djekic It’s always a challenge to manage your small business, but especially in times of crisis. Such a situation requires special skills, such as crisis management skills, […]
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn […]
Moving Beyond Honeypots to Next-Generation Deception Technology
By Wade Lance, field CTO, Illusive Networks When security professionals hear the word “deception,” they tend to immediately think of honeypots. That association needs to be updated. The concept of […]
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can […]
Your Passwords Have Already Been Hacked
Time to Remove the Ticking Time Bomb From Your IT Security Strategy By Shahrokh Shahidzadeh, CEO, Acceptto There was a time where dozens of stolen passwords or digital credentials would […]
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: […]
Best Practices for Better SOC Analysis
By Chris Calvert, co-founder, Respond Software Security analysts are a breed apart. They work long hours, using their intelligence and attention to detail to sort false alarms from real threats. […]
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to […]
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to […]
Secure Remote Active Directory Logins
By François Amigorena, CEO and founder, IS Decisions Organizations across the world have seen their way of working changed from face to face to remote working. This big change is […]
How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred […]
A Guide to Firewalls: Best Firewalls for VOIP And Unified Communications
By Christopher Gerg, CISO and VP of Cyber Risk Management, Tetra Defense The overwhelming popularity of VoIP Private Branch Exchange systems (PBX) in the modern workplace demonstrates that the benefits […]
The Cyber Challenges of the 21st Century
By Emil M.Hasanov The National Cyber Strategy demonstrates my commitment to strengthening America’s cybersecurity capabilities and securing America from cyber threats. It is a call to action for all Americans […]
Modernizing Government Processes Requires Modern Cybersecurity Practices
By Anthony Bettini, CTO, WhiteHat Security According to IDG, 89% of companies have recently adopted a digital-first business strategy or plan to do so. As part of this pattern, the […]
Cybercriminals Exploit Coronavirus with Wave of New Scams
By David Ruiz, Malwarebytes Labs With no vaccine yet developed, and with much of the world undergoing intense social distancing measures and near-total lockdown procedures, threat actors are […]
Smart Buildings
Understanding the Security Risk By Andrea Carcano, Nozomi Networks Co-founder and CPO Smart Buildings: Understanding the Security Risks Today many of the world’s most forward-thinking workplaces are deploying smart technologies […]
Shadow Iot Devices A Major Concern for Corporate Networks
By Ashraf Sheet, Regional Director Middle East & Africa at Infoblox Infoblox Inc., the leader in Secure Cloud-Managed Network Services, today announced new research that exposes the significant threat posed […]
VPNs – 2020 And Beyond
By Sebastian Schaub, Founder and CEO, hide.me In the last 5 years, awareness to protect data, to encrypt communication, and minimize data collection has rapidly increased. Privacy and trust will […]
Malware – A Cyber Threat for 2020
By Pedro Tavares, Founder of CSIRT.UBI & Editor-in-Chief seguranca-informatica.pt We are facing a transition to a new decade. The maturity in the field of cybersecurity is growing, but a wave […]
Mastering Automation to Solve Data Security for Healthcare Practices
If the Biggest Organizations Can’t Keep Our Data Safe, Then How Can a Small One? By Anne Genge, CEO, Alexio Corporation One of the greatest challenges of 21st-century is cyber-security. […]