So, Ya Wanna Be A Pen Tester, Huh?
Here are some things to consider By D. Greg Scott, Author of Bullseye Breach and Virus Bomb Do you like tearing software apart and putting it back together again, stronger […]
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts, […]
Where Property Insurance Ends and Cyber Insurance Begins—the Industry’s Biggest Issue More People Should Be Talking About
By Matt Prevost, Senior Vice President, Cyber Product Manager at Chubb Cyber-attacks are expected to cost companies more than $2 trillion in 2019, according to Juniper Research. Consequently, many companies—especially […]
From Guards to Detectives: Evolving the Junior Security Analyst Role
By Mike Armistead, CEO and Co-Founder, Respond Software Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human roles with the support of intelligent […]
The ways of responding to a terrorist encryption
By Milica D. Djekic The encryption may get a crucially significant point in some communication or information exchange activities. It’s not only important to a Defense Force as it may […]
No One Likes Passwords, So Why Are We Still Using Them?
Users Deserve Better, Websites Need to Deliver By Charles Durkin, Chief Executive Officer, Privakey Creating a new online account is a dreaded task for most internet users. Complexity and security […]
Layered Security
Two locks are better than one By David Share, Director, Amazing Support Imagine you had a million dollars (or pounds). Heck, let’s go crazy and say you have a billion […]
Lock, stock and two smoking … access controls
By Milica D. Djekic The point of this article would not be to deal with some of London’s gangs, but rather to present what the access control is and why […]
Privacy and Security Issues in Autonomous Cars
By David Navetta, Boris Segalis, and Kris Kleiner, Norton Rose Fulbright US LLP As the development of self-driving car technology progresses, the prospect of privately-owned autonomous vehicles operating on public […]
5 mistakes hindering effectiveness of SIEM solutions: Learning from real-life cases
With a SIEM solution installed, the security department can think it’s time to grab some popcorn and watch the system perfectly dealing with all possible threats impending their networks. Ah, […]
OPEN ACCESS APIs
WHAT NEEDS TO BE DONE TO MAKE THE PLATFORM MORE SECURE By David Midgley, Head of Operations, Total Processing I’m sure if you’re reading this, you already have a reasonable […]
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as […]
Wi-Fi Security Worries and the Critical Nature of Classification
By Ryan Orsi, Director of Strategic Alliances at WatchGuard Technologies Open public Wi-Fi hotspots are experiencing explosive growth. According to Cisco’s latest Visual Networking Index Forcast, by 2020, public Wi-Fi […]
It’s the Industry Titans Against the Federal Deities
Ensuring zero intrusion with best practices in the encryption software industry By Anamika Kumari, Content Writer, Allied Analytics LLP Veracrypt tracked the success route of Truecrypt with great agility. The […]
Mission Critical Security and the Rise of the Private Internet of Things
By Stewart Kantor, CFO/President, Ondas Networks We live in a world where constant data connectivity has become the standard, allowing us to access information from any number of devices operating […]
Business Risk Intelligence: A Necessity Across the Enterprise
By Josh Lefkowitz, CEO at Flashpoint While the Deep & Dark Web has yielded important security considerations for some time, it’s really been in the last 18 months that the […]
The anniversary of EMV roll-out: criminals are anxious to beat the system
By Andrei Barysevich Introduced by the financial industry in the early 2000s, EMV smart payment cards have largely supplanted magnetic stripe technology, and for good reason. Due to concerns surrounding […]
The IoT Boom and The Implications on Our Home Networks
By Domenico Crapanzano, is CEO of Fing Over the past year you have probably seen ‘Internet of Things’ (IoT) popping up all over the place, but what does this vague […]
Software Forensics: Beyond the Law
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction Traditionally, the term “forensics” is the use of science to discover evidence of criminal activity. Extending this to software broadens the use […]
The reasons to catastrophical events within a critical infrastructure
By Milica D. Djekic Many would believe that the reasons for catastrophic events within any industrial infrastructure could be based on skillfully prepared hacker’s attacks. Basically, that’s the case with […]
Startups with Information Security in Mind at Startup
What’s this all about and does it really matter? By Kip There are some very talented people starting a company’s solving very complex problems that can save organizations millions of […]
What Can You Do To Secure Your Data In The Cloud?
By François Amigorena, CEO and founder, IS Decisions Cloud storage brings so many benefits in terms of productivity and flexibility that it becomes almost impossible for organizations not to use […]
Cybersecurity Awareness Is Not Just For October!
By Joanna Huisman, KnowBe4’s new SVP Strategic Insights & Research. I have a big birthday coming up, and as you can probably guess, I’m less than thrilled about it. I tell […]
UK NCSC agency warns of APTs exploiting Enterprise VPN vulnerabilities
The UK’s National Cyber Security Centre (NCSC) warns of attacks exploiting recently disclosed VPN vulnerabilities in Fortinet, Palo Alto Networks and Pulse Secure According to the UK’s National Cyber Security […]
The Malware Research Insights
By Milica D. Djekic The malware by itself is any piece of malicious code that is capable to cause damage to the current IT configuration. The malicious applications could function […]
Cybersecurity and Compliance 1-2-3? Start With G-R-C
By John South, Senior Director of Global Threat Intelligence Development at NTT, Ltd. When an individual responsible for security, compliance and risk management in a corporation addresses these topics, the […]
Hybrid Offenses as a Current Security Concern
By Milica D. Djekic When we say an offense we would mean any kind of criminality being a transnational crime, human trafficking or act of terrorism. In its essence, any […]
Employers Catch One-Year Break on Impending California Privacy Law
By Usama Kahf, Partner, Fisher Phillips Thanks to recent negotiations among state lawmakers, it appears that California employers may get a temporary reprieve on some of the more sweeping data […]
Cloud Security Essentials — Session Monitoring
By Morey Haber, CTO & CISO, BeyondTrust The near-perfect personal attack vector is “shoulder surfing.” If you are not familiar with the concept, it is literally a threat actor looking […]
THE GLOBAL CYBER SECURITY BATTLE
LAPTOPS WILL BE THE ARTILLERY OF THE FUTURE By David J. O’Reilly, Managing Director, Hampton Court Capital Every political and military conflict now has a cybersecurity aspect to it, which […]