Have You Asked your eDiscovery Vendor
These 6 Essential Data Security Questions? By Brian Schrader, Esq., president, and CEO, BIA In today’s world of ever-increasing data theft, network hacks and other cyber threats, companies of all […]
Ways to Protect Sensitive Data Online
By Ebbe Kernel, data mining researcher & writer The world has witnessed a number of high-profile data breaches over the last couple of decades. While the impact of these breaches […]
Security Research as an Anti-Malware Secret Weapon
By Milica D. Djekic Any malware being known to the cyber community or still getting the status of the advanced persistent threat is the potential risk to your IT asset. […]
Hands-On Network Forensics ($20 Value) FREE For a Limited Time
Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threat, it’s now more important than […]
Preventing Business Email Compromise – a $300 Million Dollar Problem
Organizations Heavily Invested in Security Solutions Fall Victim to Social Engineering Attacks and Human Error By Ameet Naik, Director of Product Marketing, Armorblox A recent report from the Financial Crimes […]
The Need of Automatics and Control in Incident Response
By Milica D. Djekic The incident response as a cyber defense active measure could require the highly skillful IT security professionals who should get capable to detect, handle and mitigate […]
Top 5 Questions about the Capital One Data Breach
By Ilia Sotnikov, Vice President of Product Management, Netwrix Data breaches that affect financial institutions always become hot topics to discuss. The recent hack at financial giant and credit card […]
August Patch Tuesday
Take Advantage of Your August Patch Tuesday Break By Chris Goettl, Director of Product Management, Security, Ivanti August Patch Tuesday was a pleasant relief after the massive release of updates […]
Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
By Pratik Kirve, Sr. Specialist – Content Writer, Allied Analytics Irrespective of the kind of business you are running, the importance of digital systems and the Internet for your daily […]
Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced […]
Why “Cloud Security 101” Isn’t So Simple After All
By Josh Stella, co-founder, and CTO of Fugue The term “cloud misconfiguration” may not seem like an adequate term to describe the leading cause of cloud data breaches. It connotes […]
What Other Companies Can Learn from Facebook’s $5 Billion Fine
Organizations need to view government demands as the floor rather than the ceiling when it comes to protecting consumer data By Jacob Serpa, researcher, Bitglass While Facebook’s $5 billion settlement […]
Conversation Marketing Security Pitfalls and Best Practices
By Morey Haber, CTO & CISO, BeyondTrust According to Gartner’s recent ‘AI and ML Development Strategies’ study, 40% of organizations cite customer experience (CX) as the number one motivator for […]
Better Safe than Sorry: How to Protect Yourself While Shopping Online
By Bailey Newman, Content Team, CouponChief.com We may think nothing of filling out forms and providing data to eCommerce sites, social media sites, and public forums, but thieves and swindlers […]
5 Most Disastrous Ransomware Attacks of the Last Decade
In the past few years, we have seen a massive change in the hacking industry. Let’s take a look at the most dangerous ransomware attacks and how to stay safe […]
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it […]
Veiled Vulnerability
AD By Charles Parker, II In this day, there are vulnerabilities throughout the environment. These are blatant with malicious websites and more camouflaged as with phishing and ransomware. With another […]
NK is the new Iraq?
By Rodrigo Ruiz Referring to the television series Orange is the new black, I can not but consider it very convenient to blame the North Koreans for the worldwide incident […]
Trump’s Cyber security Executive Order: A Promising Start to Securing Digital Infrastructure…But Don’t Forget What’s Beyond the Firewall
By Lou Manousos, CEO, RiskIQ After some high-profile cyberattacks and information breaches, the cybersecurity posture of the U.S. government has never been more front and center in the public consciousness. […]
5 ways small businesses can be affected by a cyber security breach
By Asher de Metz A large-scale cybersecurity breach is hugely damaging for any organization, and with hackers becoming increasingly sophisticated, the chances of getting caught out are constantly growing. No […]
How context-aware security adds layers of protection to single sign-on services
By François Amigorena, CEO, IS Decisions Single sign-on, to the user, is a godsend. No more wasting time putting in passwords to individual sites or applications, no more trying to […]
Reducing the attack surface: how to empower your staff while keeping your network secure
By Pascal Bergeot is CEO of Goverlan Goverlan’s Pascal Bergeot considers what the recent Google Document hit means for remote workers and advises what companies need to do to reduce […]
Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues
Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet and steal funds. In June 2016, researchers with Positive Technologies […]