How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred […]
For A Fully Rounded Defence, Automate
By Karen Levy, Vice President, Product and Client Marketing, Recorded Future Cybercriminals are now running their operations in a way not dissimilar to modern legitimate businesses. Criminal groups have organizational […]
Cyber Leads Global Business Risks for First Time: Allianz Risk Barometer 2020
By Kelly Castriotta, North American Head of Product Development for Financial Lines at Allianz Global Corporate & Specialty For the first time ever, Cyber incidents (39% of responses) ranks as […]
Don’t Enable Hackers and Employees at The Same Time
By Dor Knafo, CEO, co-Founder, Axis Security When work from home went from a luxury to mandatory overnight, that put a lot of pressure on already stretched IT, teams. The […]
KPMG Recommends Steps to Bolster Cybersecurity in the COVID-19 Era
By Ton Diemont, Head of Cybersecurity at KPMG in Saudi Arabia Hackers are jumping on the COVID-19 pandemic to exploit global uncertainty Riyadh, 07 April 2020: The outbreak of Covid-19 […]
Cybercriminals Exploit Coronavirus with Wave of New Scams
By David Ruiz, Malwarebytes Labs With no vaccine yet developed, and with much of the world undergoing intense social distancing measures and near-total lockdown procedures, threat actors are […]
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just […]
Smart Buildings
Understanding the Security Risk By Andrea Carcano, Nozomi Networks Co-founder and CPO Smart Buildings: Understanding the Security Risks Today many of the world’s most forward-thinking workplaces are deploying smart technologies […]
The Hard Drive Secondary Market: The Sorry State of The Industry
Why NextUse Hard Drive Quality Surpasses the Competition By James Mannering, Hard Drive Product Manager at NextUse Remarketing, the reselling of end-of-life or retired IT assets like hard drives, is […]
Shadow Iot Devices A Major Concern for Corporate Networks
By Ashraf Sheet, Regional Director Middle East & Africa at Infoblox Infoblox Inc., the leader in Secure Cloud-Managed Network Services, today announced new research that exposes the significant threat posed […]
The Gap in Security – Data Centric Security
By Eric Rickard, CEO, Sertainty Federal Systems What do the Coronavirus pandemic, 9/11 terrorist attacks, Boeing 737 MAX crashes, and the OPM data breach have in common? First, their root […]
VPNs – 2020 And Beyond
By Sebastian Schaub, Founder and CEO, hide.me In the last 5 years, awareness to protect data, to encrypt communication, and minimize data collection has rapidly increased. Privacy and trust will […]
Analysing Data Using the Intelligence Cycle: An Overview
By Alan Blaney, Managing Director of Focus Training When it comes to analyzing different forms of intelligence, using a detailed and coherent process is crucial in order to determine the […]
Devops – Are You Risking Security for Agility?
By Morey Haber, CTO & CISO, BeyondTrust By merging software development and IT operations ― two traditionally mutually exclusive functions ― DevOps has fundamentally transformed how today’s organizations develop, operate […]
Why Zero Trust Isn’t So Trustworthy
By Benny Lakunishok, CEO and co-founder of Zero Networks Everyone agrees a zero-trust network model is an optimal way to protect your network. But can you really reach that goal […]
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information […]
The Importance of Cybersecurity Education in The Workplace
By Aman Johal, Lawyer, and Director of Your Lawyers In the last few years, we have seen unprecedented levels of data breach activity, with cybersecurity attacks compromising the personal data […]
The Public Cloud. Is It Secure?
GTB Technologies, Inc. The Data Protection Company In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store […]
TEHTRIS XDR Platform, A Holistic Cybersecurity Solution
By Laurent Oudot, Founder, CEO at TEHTRIS TEHTRIS is the European cybersecurity company that has designed and deployed the smart and holistic TEHTRIS XDR Platform in more than 50 countries […]
Enterprises Demand MSSPs Offering MDR Services Through Cybersecurity Convergence
By Arun Gandhi, Director of Product Management of the Seceon Enterprises from all verticals are embracing digital transformation. This new, increasingly connected digital world is bringing tremendous efficiencies to the […]
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly […]
Demystifying Network Investigations with Packet Data
By Michael Morris, Director of Global Technologies Alliances and Business Development, Endace A common challenge for security analysts, network operations and application teams is lacking the right data to troubleshoot […]
A Green Database
By Chris Jordan, CEO, Fluency Security Datacenters are basically toxic computer equipment in a constantly cooled warehouse. Their footprint is growing across the globe in places like Loudoun County, Virginia, […]
General Motors & the AUTO-ISAC are “Defending YOUR Wheels™”*
San Francisco – The title of the keynote presentation at RSA by Mary Barra, Chairman and Chief Executive Officer of General Motors, aptly describes the reality for anyone who is […]
COVID-19: Disaster Preparedness for the Digital-First Business
By Otavio Freire, President, CTO and Co-Founder SafeGuard Cyber COVID-19, also known as coronavirus, is proving to be a stubborn pathogen. Tragically, the global death toll has now surpassed 3,000. […]
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls […]
Understanding the True Value of Digital Health Data
By Anne Genge, CEO, and co-founder of Alexio Corporation The story of Bob ‘What do I care if someone reads my dental chart?” This is what Bob said before I […]
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management […]