Perfecting Your Cybersecurity Sales Process

By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Perfecting Your Cybersecurity Sales Process

Cybersecurity Challenges When Working from Home

By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cybersecurity Challenges When Working from Home

CRYPTO

An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on CRYPTO

Iphone Extraction Without A Jailbreak

Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Iphone Extraction Without A Jailbreak

Managing Small Business Cybersecurity During Covid-19

By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Managing Small Business Cybersecurity During Covid-19

Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Software-Defined Perimeters Offer Secure Connectivity to Smart Cities

Cyber Attacks at Sea: Blinding Warships.

Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cyber Attacks at Sea: Blinding Warships.

The Ransomware Age and How to Fight It

By Pedro Tavares,  Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on The Ransomware Age and How to Fight It

Fighting Back Against Powerful New DDoS Attack Vectors

By Tom Bienkowski, Director of Product Marketing, NETSCOUT Conniving hackers are launching sophisticated Distributed Denial of Service (DDoS) attacks more quickly, which presents many risks for enterprises. Research shows there […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on Fighting Back Against Powerful New DDoS Attack Vectors

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X