Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

How to Hunt for Volt Typhoon Malware in Critical Infrastructure

🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for…

Posted in Featured | Tagged , , , , , , | Comments Off on How to Hunt for Volt Typhoon Malware in Critical Infrastructure

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Posted in Featured, Popular | Tagged , , , , , , , | Comments Off on Why Do Hackers Love Cryptocurrency?

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of…

Posted in Featured | Tagged , , , , | Comments Off on UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers

Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the affected vendors by financially rewarding researchers. At the time, there…

Posted in Featured | Tagged , | Comments Off on Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers

The Quantum Tipping Point

Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on The Quantum Tipping Point

Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now

There is little doubt that continued effort at all levels across infrastructure and government is required to ensure the resilience required is in place By Ben Lane, Events Manager, Torch…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now

Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry

Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & Chiyi Lin, product line manager TXOne Networks Until about ten years ago,…

Posted in Uncategorized | Tagged , , , , , , , | Comments Off on Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry

Directed Analytics – The Future of Data Management

By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , | Comments Off on Directed Analytics – The Future of Data Management

5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem

Why Organizations Need to Secure Directory Services in a Hybrid Deployment from Attack Paths By Justin Kohler, Director of BloodHound Enterprise at SpecterOps   Microsoft Active Directory is one of…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on 5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X