Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first:  Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust

Halting Hackers on the Holidays 2023

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Halting Hackers on the Holidays 2023

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

Thanks to the rise of machines and shift towards zero-trust security, organizations’ security will require a new type of identity management By Murali Palanisamy, chief solutions officer, AppViewX   The […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management

How To Effectively Secure Connected Devices

By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on How To Effectively Secure Connected Devices

SOAR Into More Integrated Cybersecurity

By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being cybersecurity compliant not the same as preparedness for threats? Shouldn’t compliance mean full […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on SOAR Into More Integrated Cybersecurity

AbstractEmu, a new Android malware with rooting capabilities

AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on AbstractEmu, a new Android malware with rooting capabilities

Active Directory is Now The Number One Target of Hackers – Learn How to Harden It – Today!

Register for our Free eBook:  The Secrets of Hardening Active Directory eBook Your Active Directory servers have now become a major target for exploiters.  It is not if it will […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , , , , , , , , , | Comments Off on Active Directory is Now The Number One Target of Hackers – Learn How to Harden It – Today!

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X