AttackiQ Report On Ponemon Survey:Despite Spending An Average Of $18.4 Million On Cybersecurity Solutions, Organizations Still Get Breached
Enterprises plan on increasing their security budgets in the next year too. However, the key to preventing breaches relies upon accurately identifying and remediating gaps in current security defenses. By […]
Bitglass 2020 Predictions
By Anurag Kahol, CTO and co-founder, Bitglass We will see an increase in the number of M&A deals in 2020. In fact, 79 percent of respondents to Deloitte’s M&A trends […]
ForgeRock 2020 Predictions
By Ben Goodman, SVP at ForgeRock and CISSP 2020 Will be the Beginning of the End of Passwords. Consumers already log in to dozens of protected resources everyday: from email, […]
2020 Industry Predictions
By Peter Goldstein, CTO, and co-founder, Valimail Email security will prove to be the weakest link in election security. Email is implicated in more than 90 percent of all cybersecurity […]
McAfee is Cutting Through the Jargon, and Empowering Consumers
Las Vegas, NV – The days of the paternalistic approach to cybersecurity may be numbered. Until recently, the data security and privacy ecosystem have been driven by the assumption that […]
More Spending Won’t Solve Your Hardest IT Challenges In 2020 And Beyond. Here’s What Will.
By Chris Hallenbeck, CISO of the Americas at Tanium U.S. state and local governments have been observing the proposed State and Local Cybersecurity Government Act of 2019, especially since it […]
Fraud: A Look Back At 2019 And What to Expect in The New Year
By Christina Luttrell, IDology The approach of the new year is a good time to reflect on the fraud landscape and its impact on businesses and consumers. Fraudsters continue to push […]
Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions […]
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view […]
Iot Security and Privacy
Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age […]
Europe Cybersecurity Market Size to Steer At 13% CAGR To 2025
Europe Cybersecurity Market is estimated to be over USD 25 billion in 2018 and is expected to register a lucrative growth between 2019 and 2025 with a CAGR of over […]
The Ultimate Guide to SSL/TLS Decryption
Six Features to Consider When Evaluating SSL/TLS Inspection Solutions By Babur Khan, Technical Marketing Engineer, A10 Networks Encrypted traffic accounts for a large and growing percentage of all internet traffic. […]
8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report […]
How to Know If Someone Is Watching You on Your Camera
In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist, SEOforX In this era of video […]
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling […]
The Dark Truth of Insider Threat
By Richard Menear, CEO, Burning Tree In any business, we inherently want to trust the people we work with. By and large, we can. However, the reality is that insiders […]
Really, Imagine a Day Without Water
By Michael Yehoshua On October 23, toothpaste maker Colgate and world champion swimmer, Michael Phelps, the ambassador for the company’s Save Water initiative, headed over 1,100 organizations across the United […]
Browser Extensions Are a Leaky Vessel for Phishers to Exploit
By Atif Mushtaq, CEO, SlashNext Some of the most common and helpful ways to optimize web browsers are by adding extensions, such as those offered by Google Chrome. These typically […]
How to Stay Safe on Public Wi-Fi Networks (Detailed Guide)
Connecting to public networks is easy but staying safe on these networks is not easy as we think! Here are some tips to stay safe on public hotspots. By Susan […]
Hindsight Is 2020: Three Security Visions for The Start of The New Decade
By Dan Cole, Director, Product Management, ThreatConnect With the advent of the next decade upon us, predictions for the future are sure to abound. Prophets will prophesy, forecasters will forecast, […]
It’s Time for A Tough Conversation About Trust
By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks, […]
New Security Report Highlights Trends in Mid-Market Business Malware
By Emil Hozan, Security Analyst, WatchGuard Technologies As the security landscape continues to grow and shift, WatchGuard’s Threat Lab research team continues to offer insights into the latest malware and […]
The Email Security Challenges
By Milica D. Djekic Let’s try to remember the times of the old, good letters when the postman was knocking at your door or apparently leaving the message in your […]
The Security Challenges of Robotic Process Automation—A Primer
By Kevin Ross, Global Solutions Engineer, CyberArk Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These systems enable software robots to replicate the actions […]
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days […]
Visibility and Anomaly Detection in The Age of Iot
By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the […]
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities and local governments in Texas were hit by a coordinated ransomware attack. The hackers […]
Protecting Against Modern Cyberattacks
By Bala Sethunathan, CISO and Global Director of the Security Practice at SoftwareONE Modern cyberattacks are increasing in complexity and sophistication, as hackers are developing attack tools at a faster […]
6 Benefits of Using MFT for Encrypted File Transfers
A managed file transfer (MFT) solution is a product that successfully handles all aspects of inbound and outbound file transfers while utilizing industry-standard network protocols and encryption. It can automate […]
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that […]