3 Educational Cyber Security Steps for The Protection of Your Personal Data
By Ankit Rajpurohit Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Building Trust: The Path to True Security Synergy Between Appsec And Developers
By Matias Madou, co-founder and CTO, Secure Code Warrior A relationship that is built on the shaky foundations of mistrust is, well, best approached with low expectations. Sadly, this can […]
One Year on From Whatsapp Hack- What’s Changed?
In 2019, WhatsApp was hacked using sophisticated NSO spyware, Pegasus, used to spy on iOS WhatsApp users’ phones. By Nicole Allen, Marketing Executive, SaltDNA One year on from WhatsApp Hack […]
Are Your Corporate Networks Ready for An Impending ‘Return to Work’ Cyber Attack?
As employees rejoin the network, cyber risks are heightened. Why it’s important to have essential security measures in place before it’s too late. By Stephen Burke, Cyber Risk Aware CEO […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on […]
Cyber Warfare and its impact on businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments, and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
Cybersecurity Challenges When Working from Home
By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in […]
COVID-19 And Security Team Cuts Are Costing Businesses in Cyber and Financial Risks
By Samantha Humphries, security strategist, Exabeam With 71% of cyber professionals reporting increased threats since the COVID-19 pandemic started, are SOCs prepared to mitigate these threats? The Exabeam 2020 State […]
Security by Design: How to Protect the Future of Business
By Jim Zuffoletti, CEO & co-founder of SafeGuard Cyber Estimates suggest that by 2021, cybercrime will cost the world $6 trillion every year. This will constitute “the greatest transfer of […]
A Passwordless Future: Will Biometric Identification Replace Passwords?
By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]
Iphone Extraction Without A Jailbreak
Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]
The Ransomware Age and How to Fight It
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and Route These “Below the Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
Still Using Spreadsheets to Manage Your Digital Certificate Security?
Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital […]
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]
Women’s Health and Safety Amidst COVID-19 Cybercrime
By Sarah Katz, Senior Cyber Security Analyst, NASA Ames Research Center As the past two months have seen the COVID-19 pandemic sweep the globe, domestic violence has spiked across multiple […]
Digital Healthcare: How Secure Is the Care Data?
By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing, […]
The Devil Inside
Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]
Newsjacking COVID-19 and Other Common Cybersecurity PR Mistakes
By Evan Goldberg, SVP and Cybersecurity Practice Group Director, ARPR If you were to reflect back to the beginning of the previous decade, you’d be hard-pressed to remember more than […]
Mobile App Security in The Midst of a Pandemic
By Tom Tovar CEO and co-creator of Appdome In the “new normal” of COVID-19, businesses are relying on mobile apps to ensure business operations and revenue flowing. Restaurants, grocery stores, […]
Cybersecurity Strategies That Protect Business Operations Now and Tomorrow
Planning for the future means moving secure remote access toward the top of your list By Leo Taddeo, Chief Information Security Officer, Cyxtera Technologies and President, Cyxtera Federal Group In […]
Post-COVID-19 Cybersecurity Predictions
By Ilia Sotnikov, Vice President of Product Management, Netwrix Lots of pundits are speculating about what effects the COVID-19 pandemic will have on the economy, social behavior, politics, and related […]
COVID-19: How to Take Advantage of Teleworking
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt With the COVID-19 outbreak, companies and governments are taking preventive measures that include teleworking. This can be a turning point in the way we look […]
Top 5 Coronavirus Scams
By Zack Schuler, founder and CEO of NINJIO One of the reasons NINJIO content is so successful at capturing and holding employees’ attention is its relevance – we release new […]
$100 Million Paid – One Billion in Sight for Hackers
By Marten Mickos, CEO at HackerOne One hundred million is an enormous number. Today we celebrate with all our hackers the phenomenal milestone of a hundred million dollars in bounties. […]
A Cyber Approach to Coronavirus Containment
By Zohar Rozenberg What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign? In recent years, some in the cyber world recognize […]
Credential Stuffing: Why It’s on The Rise and How to Decrease Your Risk
By Kevin Landt, VP of Product Management at Cygilant Reports of high-profile data breaches like Equifax’s, LinkedIn’s, or Yahoo’s always caused an initial, widespread panic — and for good reason. But […]
Achieving Effective User Lifecycle Management Through Automation
By Jeff Stein, Information Security Architect, Reputation.com When considering the security of an enterprise, a key area ripe for automation should be user lifecycle management. The topic is important not […]