Gap of The Red Team from The Leak of Fireeye

Use “Imaginary Enemy” methodology to mitigate APT Attack By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone Introduction Early in the morning, I was pulled up by the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Gap of The Red Team from The Leak of Fireeye

More Power, More Responsibility

What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on More Power, More Responsibility

Zero Trust Remote Access for Engineering Teams

By Colin Rand, VP of Engineering, Banyan Security Engineering organizations present numerous challenges for security programs when it comes to remote access. They need secure access to dynamic hosts, services, […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Zero Trust Remote Access for Engineering Teams

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

How Can CISOs Work with CMOs to Secure Social Media?

By Otavio Freire, CTO & Co-Founder, SafeGuard Cyber Recent reports indicate that over half of the global population now uses social media – up 10.5% on last year’s 3.5 billion […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How Can CISOs Work with CMOs to Secure Social Media?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X