Directed Analytics – The Future of Data Management

By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Directed Analytics – The Future of Data Management

5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem

Why Organizations Need to Secure Directory Services in a Hybrid Deployment from Attack Paths By Justin Kohler, Director of BloodHound Enterprise at SpecterOps   Microsoft Active Directory is one of […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on 5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem

3 Cybersecurity Certainties for 2022

By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on 3 Cybersecurity Certainties for 2022

Data Security Must Be a Priority as Employees Quit in Record Numbers

By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5 […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Data Security Must Be a Priority as Employees Quit in Record Numbers

Detect Ransomware Data Exfiltration Immediately

By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site workforce has resulted in new security concerns since hackers now have many […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Detect Ransomware Data Exfiltration Immediately

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per record on the black market, while stolen payment card data is sold […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

Russian government claims to have dismantled REvil ransomware gang

Russia’s FSB announced to have dismantled the REvil ransomware gang, the infamous group behind Kaseya and JBS USA. The Russian Federal Security Service (FSB) announced to have shut down the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Russian government claims to have dismantled REvil ransomware gang

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X