Security in The New Normal Requires an Agile Approach
By Danny Presten, Chief Methodologist at Digital.ai Phishing attacks are up 600%, ransomware attacks have increased 148%, and the FBI has reported a 300% increase in cybercrimes. Cybercriminals are stepping…
Software-Defined Perimeters Offer Secure Connectivity to Smart Cities
By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely…
Benefits of A Security Operation Center (SOC)
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt The creation of a Security Operations Center (SOC) has increasingly stood out as something necessary to help companies defend themselves against damage caused by cyber-attacks….
Fighting Back Against Powerful New DDoS Attack Vectors
By Tom Bienkowski, Director of Product Marketing, NETSCOUT Conniving hackers are launching sophisticated Distributed Denial of Service (DDoS) attacks more quickly, which presents many risks for enterprises. Research shows there…
Still Using Spreadsheets to Manage Your Digital Certificate Security?
Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital…
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the…
Women’s Health and Safety Amidst COVID-19 Cybercrime
By Sarah Katz, Senior Cyber Security Analyst, NASA Ames Research Center As the past two months have seen the COVID-19 pandemic sweep the globe, domestic violence has spiked across multiple…
Digital Healthcare: How Secure Is the Care Data?
By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing,…
Newsjacking COVID-19 and Other Common Cybersecurity PR Mistakes
By Evan Goldberg, SVP and Cybersecurity Practice Group Director, ARPR If you were to reflect back to the beginning of the previous decade, you’d be hard-pressed to remember more than…
GDPR Working from Home Checklist in The Light Of COVID-19
Working from home in this pandemic period? Check some risk associated with it and Follow this step by step checklist that organizations need to take… By Susan Alexandra, Contributing Writer…
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to…
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to…