How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]
NCSAM Provided an Opportunity to Reset Our Approach to Cybersecurity
October marked National Cyber Security Awareness Month, but experts warn that cybersecurity requires attention 24/7/365 By Sam Humphries, Security Strategist, Exabeam Earlier this year in the rapid transition to a […]
Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase […]
Cybersecurity Best Practices for End Users
By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations […]
Zero Trust Model Is Meaningless Without TLS Inspection
Protecting users against modern, invisible cyber threats By Babur Khan, Technical Marketing Engineer at A10 Networks A security strategy is only as strong as its weakest point. No matter how […]
Has Your Data Been Leaked to the Dark Web?
By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]
The Impact Of Blockchain & Crypto On Cyber Security
By Jesús Cedeño, Senior Editor, cryptocoinsociety.com These days many people (especially if they’re more or less tech-oriented) have heard about cryptocurrencies and blockchains. Even if they don’t fully understand these […]
Reducing ‘Cyber-security Engineer Burnout’
A first-hand experience of the workload challenges security engineers face, and how their employers can help to address them By Tim Bloomer, a Sales Engineer at AlgoSec I’m sure we’ve […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security By Kaushik Narayan, CTO Cloud Business Unit, McAfee While cloud services deliver on promised savings and convenience, they still […]
5 Steps to Ensure Iot Security Amidst CMMC Compliance
By Mike Raymond, Federal Sales Manager, Ordr Cyber threats against the U.S. and the Department of Defense (DoD) are very real, and efforts related to the department’s Cybersecurity Maturity Model […]
FIRST launches new code of ethics for incident response and security teams on Global Ethics Day
By Shawn Richardson, Ethics SIG co-Chairs of FIRST. October 21, 2020 – following a global consultation, the Forum of Incident Response and Security Teams (FIRST) is launching new ethics guidelines […]
Why Deepfakes Will Threaten the Future of Digital Communications
By Steve Durbin, Managing Director, Information Security Forum Advanced deepfakes of high-profile individuals or executives will soon threaten to undermine digital communications, spreading highly credible fake news and misinformation. Deepfakes […]
How Can CISOs Work with CMOs to Secure Social Media?
By Otavio Freire, CTO & Co-Founder, SafeGuard Cyber Recent reports indicate that over half of the global population now uses social media – up 10.5% on last year’s 3.5 billion […]
Business Email Compromise – Why Is It Dangerous and How to Avoid It
By Elena Georgescu, Communication & PR Officer at Heimdal™ Security When talking about business email compromise, we cannot omit to mention two aspects: technology and money. Technology is the engine […]
Election Integrity Is A Moving Target, But It’s Essential to Pursue
Measures to improve voting security need to start long before election day itself By Craig Hinkley, Chief Executive Officer, WhiteHat Security, a wholly-owned, independent subsidiary of NTT Ltd. U.S. […]
Cyber Liability Insurance – Safe Bet or Sales Gimmick?
By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we see more stories about companies overtaken by this type of cyberattack. Garmin and Canon, […]
Privacy Shield Revoked
What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies On July 16th, the European Court of Justice (ECJ) struck down the EU-US data […]
5 Ways to Avoid Security Automation Pitfalls
By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to boost threat detection and response. […]
Weaknesses of Biometric Authentication
By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever. The democratization of digital […]
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes […]
Cyber Warfare and Its Impact on Businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
What Is Being Done, And How Can They Improve?
By Martin Banks People have worried about the safety of nuclear energy since it first came around in the mid-twentieth century. Nuclear energy has a lot of potential for powering […]
There’s a Hole in Your Threat Detection Strategy—It’s Called East/West Traffic
By Carolyn Crandall, Chief Deception Officer, Attivo Networks One of the most popular targets for attackers, cybercriminals, and other bad actors is east/west network traffic. This is network traffic that […]
Covid-19 Unveiled a New Security Gap
By Eddy Bobritsky, CEO & Co-Founder, Minerva Labs As COVID-19 spreads, more organizations are enforcing remote work from home, making employees home computers more vulnerable than ever to cyberattacks. The […]
Are the Worst Cryptocurrency Security Breaches Behind Us?
By Tim Fries, Co-Founder, The Tokenist You would be right in assuming that blockchain itself was never hacked, but that doesn’t mean people don’t like to give up security features […]
Cyber Against Granny
By Yotam Gutman, SentinelOne Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged 60 and over) in the United States. Cybercrime can be defined as “any […]
Is API Usage Putting Your Organization Out of Compliance?
By Matt Keil, Director of Product Marketing, Cequence Security APIs (“Application Programming Interfaces”) are increasingly being used as the conduit for data exchange between applications, infrastructure, and IoT devices. The […]
Why Academic Openness and A Rise in Online Classes Should Invoke A Renewed Focus on Security
By Anthony Bettini, CTO, WhiteHat Security For decades, researchers and students from around the world have come to study and collaborate, research, and innovate at American universities and colleges under […]