Changing Cybersecurity Culture One Habit at A Time
By George Finney, Chief Security Officer for Southern Methodist University and Author of Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future My first job out of college…
How to Avoid or Remove Mac Malware
Today, Macs are more prone to hacking attacks than PCs. In this article, you’ll find useful tips on how to detect malware on your computer and get rid of it….
Automotive Cybersecurity Is Not One-Size-Fits-All. Here’s How Oems And Tier 1s Can Tailor Their Approach to Meet the Needs of The Market
OEMs, Tier 1s, and key supply chain players all differ in their approach to cybersecurity, opting for strategies that align specifically with their needs. Chief Product and Marketing Officer Nathaniel…
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes…
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on…
Ransomware, Risk, And Recovery
Why You Need to Take A Hard Look At Your Corporate Recovery Plan By Mickey Bresman, CEO, Semperis What we as IT and security professionals worry about when planning…
Cybersecurity Challenges When Working from Home
By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in…
CRYPTO
An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated…
Iphone Extraction Without A Jailbreak
Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied…
Managing Small Business Cybersecurity During Covid-19
By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote…
Software-Defined Perimeters Offer Secure Connectivity to Smart Cities
By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely…
Cyber Attacks at Sea: Blinding Warships.
Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the…