How to provide both a Secure & Seamless Remote Onboarding Experience on a Regula Basis?
By Arif Mamedov, Ph.D., President of Regula Forensics, Inc. Onboarding is like a gateway, where you as a guard can either let the right person in or assure that a […]
Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints
By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated, […]
2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same
By Nir Gaist, Nyotron, Founder Cybersecurity has gone through many phases over the last few decades. Today, we hear about a new, more volatile-than-the-last attack every day that has the […]
SAP systems are targeted within 72 hours after updates are released
On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm Onapsis warns. According to a joint study published by Onapsis […]
4 Matchmaking Tips to Find your Perfect SOC 2 Fit
Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place […]
Secure, Managed File Transfer: What’s Old is New Again
Intrigue and Espionage May not Come to Mind when You Think of MFT—But it Should By Gregory Hoffer, CEO, Coviant Software When you think about secure, managed file transfer (you […]
Bitcoin Soars but Will Security Risks Spark Greater Regulation?
By Marcella Arthur – VP, Global Marketing at Unbound Tech Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and Mastercard after […]
Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?
A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live […]
The Best Network Protection: Go Deep or Go Broad?
By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their […]
Thousands of VMware Center servers exposed online and potentially vulnerable to CVE-2021-21972 flaw
A Chinese security researcher published a PoC code for the CVE-2021-21972 vulnerability in VMware Center, thousands of vulnerable servers are exposed online. A Chinese security researcher published the Proof-of-concept exploit code for […]
The US Government is going to respond to the SolarWinds hack very soon
The US is going to respond to the SolarWinds supply chain attack within weeks, national security adviser Jake Sullivan told CNN. The US will respond within weeks to the devastating SolarWinds […]
Personal Data Breaches for GDPR Compliance: Everything You Need to Know
By Dan May, Commercial Director, ramsac In the new era of cybercrime, identifying the proper sanctions and reactions for any business can seem challenging, if not confusing. When it comes […]
Hackers abuse Plex Media servers for DDoS amplification attacks
Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Security researchers from Netscout discovered DDoS-for-hire services have found a way to abuse Plex […]
Over 3.2 billion emails and passwords hacked…find out if you are a victim and what to do about it…
It’s time to consider new passwords and multi-factor authentication or password management tools The current breach is really a compilation of many breaches, hence it’s name “Compilation of Many Breaches” […]
Operation NightScout: supply chain attack on NoxPlayer Android emulator
Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and Macs. UPDATE (February 18, 2021): Following the publication of our […]
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]
Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase […]
One Year on From Whatsapp Hack- What’s Changed?
In 2019, WhatsApp was hacked using sophisticated NSO spyware, Pegasus, used to spy on iOS WhatsApp users’ phones. By Nicole Allen, Marketing Executive, SaltDNA One year on from WhatsApp Hack […]
Security in The New Normal Requires an Agile Approach
By Danny Presten, Chief Methodologist at Digital.ai Phishing attacks are up 600%, ransomware attacks have increased 148%, and the FBI has reported a 300% increase in cybercrimes. Cybercriminals are stepping […]
Software-Defined Perimeters Offer Secure Connectivity to Smart Cities
By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely […]
Benefits of A Security Operation Center (SOC)
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt The creation of a Security Operations Center (SOC) has increasingly stood out as something necessary to help companies defend themselves against damage caused by cyber-attacks. […]
Fighting Back Against Powerful New DDoS Attack Vectors
By Tom Bienkowski, Director of Product Marketing, NETSCOUT Conniving hackers are launching sophisticated Distributed Denial of Service (DDoS) attacks more quickly, which presents many risks for enterprises. Research shows there […]
Still Using Spreadsheets to Manage Your Digital Certificate Security?
Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital […]
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]
Women’s Health and Safety Amidst COVID-19 Cybercrime
By Sarah Katz, Senior Cyber Security Analyst, NASA Ames Research Center As the past two months have seen the COVID-19 pandemic sweep the globe, domestic violence has spiked across multiple […]
Digital Healthcare: How Secure Is the Care Data?
By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing, […]
Newsjacking COVID-19 and Other Common Cybersecurity PR Mistakes
By Evan Goldberg, SVP and Cybersecurity Practice Group Director, ARPR If you were to reflect back to the beginning of the previous decade, you’d be hard-pressed to remember more than […]
GDPR Working from Home Checklist in The Light Of COVID-19
Working from home in this pandemic period? Check some risk associated with it and Follow this step by step checklist that organizations need to take… By Susan Alexandra, Contributing Writer […]
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to […]
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to […]