Best Practices in Cyber Security for Businesses
By Tim Green Cybersecurity–information technology security–is the practice of protecting computers, applications, data, and networks from illegal access. From hacking to computer viruses, to phishing emails and calls, efficient cybersecurity […]
Three Tips to Avoid Going Phishing
By Travis Rosiek, CTO, Tychon It’s an old trick in the physical world. Getting into a secured building is easiest if an infiltrator can get an authorized person to open […]
The Fatal Danger Lurking in Today’s Fortune 500
By Tatu Ylonen, founder and SSH Fellow, SSH Communications Security It takes a special combination of leaders, ideas, and processes to become a Fortune 500 company. By the time an […]
Office Depot
Allegedly Creative Vulnerability Diagnosis By Charles Parker, II; InfoSec Architect Retailers do not have the most pleasant sets of responsibilities. There are pressures from the staff, management, corporate office, and […]
CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of computers to do things normally done by people — in particular, things associated […]
New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for […]
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from […]
The best practices in dealing with ransomware
By Milica D. Djekic Our society is becoming dependable on new technologies in both – legal and illegal connotation. The hacker’s community is getting bigger and bigger and it’s right […]
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory […]
The Dawn of the DDoS of Things (DoT)
Dr. Chase Cunningham, Director of Cyber Operations at A10 Networks Last year saw an unprecedented uptick in the volume, size, and scope of distributed denial of service (DDoS) attacks. Led […]
Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
By Anas Baig If the recent anti-privacy bill’s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their […]
Tesco Bank
Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as […]
Nation State Cyber Attacks Emerge from the Shadows
By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information […]
Why today’s university students pose a massive cyber threat — and what to do about it
By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young […]
Part I: The Anatomy of a Wi-Fi Hacker in 2019
By Ryan Orsi, Director Product Management, WatchGuard Technologies We all know the use of Wi-Fi is pervasive because people crave a constant digital connection. So much so, that they’ll spend […]
10 cyber security measures growing companies should implement
Tips to keep your business safe as it expands By Asher de Metz, Lead Senior Consultant (Information Security), Sungard Availability Services (Sungard AS) This may surprise you, but growing companies […]
Best Practices to keep your Home WiFi Secured
by Lisa Barrie, Sub-editor at List Enthusiast Wi-Fi internet or traditional wired internet? Ask any person and he/she’ll go for the former. The ease-of-use, easier installation, and maintenance mean Wi-Fi […]
Multi-factor Authentication Implementation Options
“2FA to 5FA – What are the options available?” By David Smith Independent Consultant at Smart Card Institute At some point of time, we have all used an OTP (One-time […]
How Real-Time Asset Intelligence Enables Full Posture Control
By Ellen Sundra, VP of Americas Systems Engineering, Forescout Technologies The massive growth of devices hitting our networks is not a secret or a new discussion. We have all seen […]
Stop! Vulnerable Software
Know your vulnerabilities By Joe Guerra, M.Ed, CySA+, C|EH, Cybersecurity Instructor, Hallmark University Software is omnipresent, even in areas you wouldn’t envision Software so effortlessly meshes into the cloth of […]
Server less Security Analysis: The Best Practices on How to Enforce Them
By Aaron Chichioco, content editorial manager/web designer, Design Doxa Even before companies started making the jump to go serverless, security has already been a concern in a world largely becoming […]
Protecting Your Business against DDoS Attacks Requires Simple Best Practices
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the twenty years since a University of Minnesota computer came under attack from a network of over 100 […]
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to […]
Cyber security Checklist: How to Keep Your Business Secure
By Lucy Manole, Content Writer, Right Mix Marketing Source: Freepik In this era of digitalization, businesses are moving online faster than ever, resulting in an explosion of data. Most companies […]
How the Internet of Things Could Compromise Online Security
By Chris Usatenko, Content Creator, EveryCloud The concept of an Internet of Things has been a dream held by many tech geeks. Up until a few years ago, though, the […]
Data Risk Report Shows Lack of Security across Industries
87% of companies lack data security By Rob Sobers, software engineer, Varonis When it comes to cybersecurity, one of the top concerns is the risk and vulnerability of sensitive data. […]
5 Key Differences between Software and Hardware Vulnerability Mitigations
By Anders Fogh, Senior Principal Engineer at Intel The software stack has long been a fruitful target for hackers looking to exploit organizations – and this is not likely to […]
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for […]
Ransomware: A Municipality’s Achilles Heel
By Russ Cohen, Vice President of Cyber Services, Chubb From large metropolitan cities like Atlanta to smaller communities like Key Biscayne, every city in America is vulnerable to cyber-attacks. In […]
Understanding Application Risk Management
By Haythem Hammour, Product Marketing Manager, Brinqa On April 25, Docker®[1] discovered a breach of unauthorized access to a single Docker Hub database storing a subset of non-financial user data. […]