Cyber Prevention Is No Panacea
Detection is Key When Prevention Fails By Tony Cole, CTO, Attivo Networks Last year Gartner estimated cybersecurity spending to grow to $124 Billion US dollars globally, and by 2021 to […]
Moving Network Security to The Cloud
What is secure access service edge (sase) and why it matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only […]
Coronavirus as an Opportunity to Evolve Security Architecture
By Zohar Rozenberg, VP of Cyber Investments for Elron [Editor’s Note: This article is included in a series of current commentaries on the broad-ranging technical and economic effects of the […]
World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale. […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management […]
How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that. […]
The Consumer Technology Association – What Trends Lie Ahead in the 2020’s
If one thing was made boldly apparent at the CES 2020, it’s that everything is trending toward connectivity. Soon, there will be scarcely any facet of our daily lives that […]
AttackIQ 2020 Predictions
By Christopher Kennedy, CISO and VP of Customer Success, AttackIQ 2020 Election Security Insecurity: Election security will be an open wound that can’t be healed in time for the 2020 […]
ForgeRock 2020 Predictions
By Ben Goodman, SVP at ForgeRock and CISSP 2020 Will be the Beginning of the End of Passwords. Consumers already log in to dozens of protected resources everyday: from email, […]
Moving Network Security to The Cloud
What Is Secure Access Service Edge (Sase) And Why It Matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only […]
Fraud: A Look Back At 2019 And What to Expect in The New Year
By Christina Luttrell, IDology The approach of the new year is a good time to reflect on the fraud landscape and its impact on businesses and consumers. Fraudsters continue to push […]
Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions […]
Iot Security and Privacy
Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age […]
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling […]
The Dark Truth of Insider Threat
By Richard Menear, CEO, Burning Tree In any business, we inherently want to trust the people we work with. By and large, we can. However, the reality is that insiders […]
Browser Extensions Are a Leaky Vessel for Phishers to Exploit
By Atif Mushtaq, CEO, SlashNext Some of the most common and helpful ways to optimize web browsers are by adding extensions, such as those offered by Google Chrome. These typically […]
Out-Smarting the Cybersecurity Skills Shortage
By Ofer Or, VP of Product, Tufin Organizations across the globe are struggling to recruit the talent they need for their open security roles. Unfortunately, the problem is expected to […]
Visibility and Anomaly Detection in The Age of Iot
By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the […]
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once […]
BeyondTrust Cybersecurity Predictions for 2020 & Beyond
2020 Prediction Contributors: Morey Haber, CTO/CISO at BeyondTrust and Christopher Hills, Sr. Solutions Architect, Office of the CTO at BeyondTrust It’s possible that the earliest security predictions began on that […]
6 Benefits of Using MFT for Encrypted File Transfers
A managed file transfer (MFT) solution is a product that successfully handles all aspects of inbound and outbound file transfers while utilizing industry-standard network protocols and encryption. It can automate […]
TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that. How did they accomplish this esteemed […]
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that […]
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]
Applying Security Across Heterogeneous IT Systems
Proactive Threat Interference® provides protection not offered by other cybersecurity approaches By Steve Ryan, CEO & Co-Founder, Trinity Cyber, Inc. Do I patch my system in the name of security, […]
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and […]
How to Stop Cybersecurity Attacks before They Start
By Dr. Johannes Bauer, principal security advisor, identity management & security, UL Cybersecurity breaches are part of the nasty reality of today’s IT infrastructure and even though they are not […]