Building Trust: The Path to True Security Synergy Between Appsec And Developers

By Matias Madou, co-founder and CTO, Secure Code Warrior A relationship that is built on the shaky foundations of mistrust is, well, best approached with low expectations. Sadly, this can […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Building Trust: The Path to True Security Synergy Between Appsec And Developers

Cybersecurity Challenges When Working from Home

By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cybersecurity Challenges When Working from Home

A Passwordless Future: Will Biometric Identification Replace Passwords?

By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on A Passwordless Future: Will Biometric Identification Replace Passwords?

Iphone Extraction Without A Jailbreak

Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Iphone Extraction Without A Jailbreak

The Ransomware Age and How to Fight It

By Pedro Tavares,  Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on The Ransomware Age and How to Fight It

Still Using Spreadsheets to Manage Your Digital Certificate Security?

Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Still Using Spreadsheets to Manage Your Digital Certificate Security?

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Digital Healthcare: How Secure Is the Care Data?

By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing, […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Digital Healthcare: How Secure Is the Care Data?

The Devil Inside

Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on The Devil Inside

Mobile App Security in The Midst of a Pandemic

By Tom Tovar CEO and co-creator of Appdome In the “new normal” of COVID-19, businesses are relying on mobile apps to ensure business operations and revenue flowing. Restaurants, grocery stores, […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Mobile App Security in The Midst of a Pandemic

Cybersecurity Strategies That Protect Business Operations Now and Tomorrow

Planning for the future means moving secure remote access toward the top of your list By Leo Taddeo, Chief Information Security Officer, Cyxtera Technologies and President, Cyxtera Federal Group In […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cybersecurity Strategies That Protect Business Operations Now and Tomorrow

Post-COVID-19 Cybersecurity Predictions

By Ilia Sotnikov, Vice President of Product Management, Netwrix Lots of pundits are speculating about what effects the COVID-19 pandemic will have on the economy, social behavior, politics, and related […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Post-COVID-19 Cybersecurity Predictions

$100 Million Paid – One Billion in Sight for Hackers

By Marten Mickos, CEO at HackerOne One hundred million is an enormous number. Today we celebrate with all our hackers the phenomenal milestone of a hundred million dollars in bounties. […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on $100 Million Paid – One Billion in Sight for Hackers

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X