Sovereign Cyber Effects Provided Voluntarily by Allies (SCEPVA)

The Devil is in the Kilobyte By Wiesław Goździewicz, Expert, Kościuszko Institute NATO has gone a long way in the development of its policy on cyber operations. The three most […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Sovereign Cyber Effects Provided Voluntarily by Allies (SCEPVA)

CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

One of the two flaws in Chrome addressed by Google, CVE-2019-13720, was exploited in a campaign that experts attribute to Korea-linked threat actors. This week Google released security updates to […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

How to Build an Effective Insider Threat Program: Part I

By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How to Build an Effective Insider Threat Program: Part I

Three Key Business Lessons From The Founder of a Big Data Security Company

By MacLane Wilkison, Co-Founder of ZeroDB When startups mix with corporations we see an oil-and-water effect. There’s often a gap in work practices, organizational structure, and managerial outlook, not to […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Three Key Business Lessons From The Founder of a Big Data Security Company

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X