Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on 4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on The Best Network Protection: Go Deep or Go Broad?

Operation NightScout: supply chain attack on NoxPlayer Android emulator

Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and Macs. UPDATE (February 18, 2021): Following the publication of our […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Operation NightScout: supply chain attack on NoxPlayer Android emulator

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

Fighting Back Against Powerful New DDoS Attack Vectors

By Tom Bienkowski, Director of Product Marketing, NETSCOUT Conniving hackers are launching sophisticated Distributed Denial of Service (DDoS) attacks more quickly, which presents many risks for enterprises. Research shows there […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on Fighting Back Against Powerful New DDoS Attack Vectors

Still Using Spreadsheets to Manage Your Digital Certificate Security?

Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Still Using Spreadsheets to Manage Your Digital Certificate Security?

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Digital Healthcare: How Secure Is the Care Data?

By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing, […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Digital Healthcare: How Secure Is the Care Data?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X