Log4j Showed Us That Public Disclosure Still Helps Attackers.

Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25 pm on the 9th of December an infamous (now deleted) tweet linking a 0-day […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Log4j Showed Us That Public Disclosure Still Helps Attackers.

On The Frontline in The War Against Hackers

By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace.  Businesses are conducting […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on On The Frontline in The War Against Hackers

Directed Analytics – The Future of Data Management

By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Directed Analytics – The Future of Data Management

5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem

Why Organizations Need to Secure Directory Services in a Hybrid Deployment from Attack Paths By Justin Kohler, Director of BloodHound Enterprise at SpecterOps   Microsoft Active Directory is one of […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on 5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

Why Ransomware is Only a Symptom of a Larger Problem

While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Why Ransomware is Only a Symptom of a Larger Problem

5 Ways to Protect Your Workplace from Cybersecurity Threats

The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and hackers to exploit data security flaws. By Nicole Allen, Marketing Executive, Salt […]

Posted in Cyber Security News | Tagged , , , | Comments Off on 5 Ways to Protect Your Workplace from Cybersecurity Threats

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X