Office Depot
Allegedly Creative Vulnerability Diagnosis By Charles Parker, II; InfoSec Architect Retailers do not have the most pleasant sets of responsibilities. There are pressures from the staff, management, corporate office, and […]
Shedding the Light on Deep Network Visibility for Cyber Intelligence Applications
DWDM is the backbone technology for optical networks but presents a challenge to government agencies with intercept responsibilities. By Mike Seidler, Senior Product Manager, NetQuest Corporation Dense Wave Division Multiplexing […]
CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of computers to do things normally done by people — in particular, things associated […]
New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for […]
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from […]
The best practices in dealing with ransomware
By Milica D. Djekic Our society is becoming dependable on new technologies in both – legal and illegal connotation. The hacker’s community is getting bigger and bigger and it’s right […]
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory […]
This Data is mine, mine, mine, mine.
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. It seems every time I write an article I could mention Trumps’ approach to cybersecurity; watching him is like an old Animaniacs […]
Cyber Security the Major Issue of 2019
By Angelica Technology has provided services to the whole humanity like no time ever before. Now in this contemporary world, everything is connected such as cars, cities, planes, homes and […]
The Dawn of the DDoS of Things (DoT)
Dr. Chase Cunningham, Director of Cyber Operations at A10 Networks Last year saw an unprecedented uptick in the volume, size, and scope of distributed denial of service (DDoS) attacks. Led […]
Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
By Anas Baig If the recent anti-privacy bill’s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their […]
Tesco Bank
Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as […]
Nation State Cyber Attacks Emerge from the Shadows
By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information […]
Why today’s university students pose a massive cyber threat — and what to do about it
By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young […]
PART II: DEFENDING YOUR AIRSPACE
WIPS vs. WIDS By Ryan Orsi, Director Product Management, WatchGuard Technologies In part one of this series: The Anatomy of a Wi-Fi Hacker, we addressed the ever-growing need for a […]
Part I: The Anatomy of a Wi-Fi Hacker in 2019
By Ryan Orsi, Director Product Management, WatchGuard Technologies We all know the use of Wi-Fi is pervasive because people crave a constant digital connection. So much so, that they’ll spend […]
Phishermen
How Insider Threats are Realized By Daniel Jetton, VP Cyber Services, OBXtek, Inc. While technical security problems can be dealt with through technical solutions, people must be approached in a […]
Protecting Your Business against DDoS Attacks Requires Simple Best Practices
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the twenty years since a University of Minnesota computer came under attack from a network of over 100 […]
Ransomware: A Municipality’s Achilles Heel
By Russ Cohen, Vice President of Cyber Services, Chubb From large metropolitan cities like Atlanta to smaller communities like Key Biscayne, every city in America is vulnerable to cyber-attacks. In […]
Ways to Protect Sensitive Data Online
By Ebbe Kernel, data mining researcher & writer The world has witnessed a number of high-profile data breaches over the last couple of decades. While the impact of these breaches […]
Preventing Business Email Compromise – a $300 Million Dollar Problem
Organizations Heavily Invested in Security Solutions Fall Victim to Social Engineering Attacks and Human Error By Ameet Naik, Director of Product Marketing, Armorblox A recent report from the Financial Crimes […]
Top 5 Questions about the Capital One Data Breach
By Ilia Sotnikov, Vice President of Product Management, Netwrix Data breaches that affect financial institutions always become hot topics to discuss. The recent hack at financial giant and credit card […]
Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
By Pratik Kirve, Sr. Specialist – Content Writer, Allied Analytics Irrespective of the kind of business you are running, the importance of digital systems and the Internet for your daily […]
Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced […]
What Other Companies Can Learn from Facebook’s $5 Billion Fine
Organizations need to view government demands as the floor rather than the ceiling when it comes to protecting consumer data By Jacob Serpa, researcher, Bitglass While Facebook’s $5 billion settlement […]
Better Safe than Sorry: How to Protect Yourself While Shopping Online
By Bailey Newman, Content Team, CouponChief.com We may think nothing of filling out forms and providing data to eCommerce sites, social media sites, and public forums, but thieves and swindlers […]
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it […]
Lazarus: Data Leakage With Cryptographic System
By Rodrigo Ruiz & Rogério Winter You have most probably already received the recommendation or even the imposition of keeping a “strong password” in your applications. A strong password is […]
5 ways small businesses can be affected by a cyber security breach
By Asher de Metz A large-scale cybersecurity breach is hugely damaging for any organization, and with hackers becoming increasingly sophisticated, the chances of getting caught out are constantly growing. No […]
How context-aware security adds layers of protection to single sign-on services
By François Amigorena, CEO, IS Decisions Single sign-on, to the user, is a godsend. No more wasting time putting in passwords to individual sites or applications, no more trying to […]