4 Ways to Improve Azure Active Directory Security
Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis Cloud-led innovation has accelerated the digital transformation of many organizations that have […]
Redefining Resilience in The New World of Work
By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic has accelerated the move towards hybrid and remote working which was already […]
How to strengthen cyber resilience with Unified BCDR
By Joe Noonan, General Manager, Unitrends and Spanning Cybercrime and hybrid work environments prompted by the pandemic have significantly impacted the way organizations protect and store their data. Data is […]
Ransomware — Encrypt Your Data Before Others Do
Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A single malicious email, with the sender of the mail disguised as a […]
Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability […]
Getting Started with Active Directory Security
Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management. […]
Surviving The New Era of Terabit-Class DDoS Attacks
By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted service for the developer platform GitHub. The attack, which lasted for approximately […]
North Korea-linked threat actors stole $1.7 billion from cryptocurrency exchanges
North Korea-linked threat actors are behind some of the largest cyberattacks against cryptocurrency exchanges. North Korea-linked APT groups are suspected to be behind some of the largest cyberattacks against cryptocurrency […]
StayHackFree – Don’t Be Barry
The Holiday call from a buddy you do not want to get – much less make. By James Gorman, CISO, Authx Friday the week before Thanksgiving, driving home for the […]
Cuba ransomware gang hacked 49 US critical infrastructure organizations
The FBI has revealed that the Cuba ransomware gang breached the networks of at least 49 US critical infrastructure organizations. A flash alert published by the FBI has reported that […]
Nobelium APT targets French orgs, French ANSSI agency warns
The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since February 2021. The French national cybersecurity agency ANSSI (Agence Nationale de la […]
Analyzing The Security Challenge of Hybrid and Remote Working Models
By Mike East, VP EMEA, Menlo Security The pandemic has shifted the balance in many arenas, not least in relation to cybersecurity. Where COVID-19 has continued to have a drastic […]
Multicloud Rolls In: Federal IT Professionals Share Insights and Challenges
By Rick Rosenburg, Vice President and General Manager, Rackspace Government Solutions, Rackspace Technology Federal agencies kicked into IT modernization overdrive during the pandemic and, as 2022 approaches, agencies are looking […]
The 5 Most Common Cyber-Attacks on Mobile Devices In 2021
By Nicole Allen, Marketing Executive, Salt Communications. Many companies are prioritising mobile efforts these days with research suggesting that increased mobility helps businesses enhance their operations and efficiency. Verizon’s 2021 […]
CISA shares a catalog of 306 actively exploited vulnerabilities
The US CISA shared a list of vulnerabilities known to be exploited in the wild and orders US federal agencies to address them within deadlines. The US Cybersecurity and Infrastructure […]
Russia-linked Nobelium APT targets orgs in the global IT supply chain
Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May 2021. The SolarWinds security breach was not isolated, Russia-linked Nobelium APT group has […]
Being Mindful of Communication Security
The potential risks of communication APIs and CPaaS and secure vendor selection criteria. By James Ryan, Director of Information Security, BISO, IntelePeer The pandemic accelerated the demand for various things, […]
How to Close the Security Gap Between Identity and Access Management (IAM) and Shared Accounts
By Maurice Côté, Vice President of Business Solutions, Devolutions For more than half a century, passengers of London’s underground (a.k.a. The Tube) have been warned to “mind the gap” when […]
Cyber EO and Meeting Cloud Modernization Effort
By Stephen Kovac, Vice President of Global Government and Head of Corporate Compliance, Zscaler In wake of recent high profile attacks and an evolving hybrid work environment, agencies are working […]
Microsoft warns of a zero-day in Internet Explorer that is actively exploited
Microsoft warns of a zero-day vulnerability in Internet Explorer that is actively exploited by threat actors using weaponized Office docs. Microsoft warns of a zero-day vulnerability (CVE-2021-40444) in Internet Explorer […]
Time to Act: How Real-Time Analytics Can Help Stop the Cyber Kill Chain
Access to Real-Time Contextualized Information through In-Memory Computing Can Help Security Teams Spot Evolving Threats Before It’s Too Late By Dr. William Bain, CEO and Founder of ScaleOut Software In […]
New Report Reveals Traditional Anti-Malware Solutions Miss 74% of Threats
By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies The threat landscape is an erratic and ever-evolving beast. While it knows no master, its behavior is broadly directed by the host […]
ChaosDB, a Critical Cosmos DB flaw affected thousands of Microsoft Azure Customers
Microsoft has fixed a critical flaw in Cosmos DB that allowed any Azure user to remotely take over other users’ databases without any authorization. Researchers from Cloud security company Wiz […]
Looking Back at Executive Order on Cybersecurity and What it Means for Your Business
By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives to accomplish several important objectives for the United States’ approach to safeguarding its data and […]
Chinese Government Will Begin to Stockpile Zero-Days in September
By Randy Reiter CEO of Don’t Be Breached July 2021 has Been A Busy Month in Cyber Security The Associated Press published on Tuesday, July 13, 2021 that on September […]
Four Ways Smart Cities Can Stay Safe in An Interconnected World
Mitigating the risks of cyber threats through cyber intelligence and frontier technologies By Ritesh Kumar, Chairman & CEO, CYFIRMA Smart cities bring about an abundance of benefits for a nation […]
Evaluating Security Practices in Response to Colonial Pipeline And South Korean KAERI Attacks
Zero Trust and Enforcing the Principle of Least Privilege Have Become Crucially Important. By Garret Grajek, CEO, YouAttest In recent news, we have seen several high-profile attacks on major institutions […]
Understanding The Importance of Designing for Security
By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of Client Security Strategy and Initiatives at Intel Robust security is a necessary […]
StealthWorker botnet targets Synology NAS devices to drop ransomware
Taiwanese vendor Synology has warned customers that the StealthWorker botnet is targeting their NAS devices to deliver ransomware. Taiwan-based vendor Synology has warned customers that the StealthWorker botnet is conducting […]
Conti ransomware affiliate leaked gang’s training material and tools
An affiliate of the Conti RaaS has leaked the training material shared by the group with its network along with the info about one of the operators. An affiliate of […]