Anomaly Detection Is the Next Cybersecurity Paradigm
It’s time to move beyond static lists of things forbidden and things allowed. By Aron Hsiao, Director of Marketing and Insights, Plurilock Static lists have long been at the heart […]
Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions […]
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling […]
What’s the Security Misconfiguration Antidote? Automation.
By Joshua Williams, Senior Cloud and Automations Solutions Engineer, FireMon The collective security community is spending too time much worrying about vulnerabilities. They need to shift some of those resources […]
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management […]
New Security Report Highlights Trends in Mid-Market Business Malware
By Emil Hozan, Security Analyst, WatchGuard Technologies As the security landscape continues to grow and shift, WatchGuard’s Threat Lab research team continues to offer insights into the latest malware and […]
Why Insider Data Breaches Will Continue in 2020
By Randy Reiter CEO of Don’t Be Breached Insider Data Breaches That Occurred in 2019 More than two-thirds of corporations are not prepared to combat Insider Data Breaches as reported […]
The Growing Costs of Cyber Attacks on UK Small Businesses
By Dan Baker, Content Writer, SecureTeam The amount of cyber attacks in the UK and across the world continues to grow each year and small businesses are increasingly the targets […]
The Email Security Challenges
By Milica D. Djekic Let’s try to remember the times of the old, good letters when the postman was knocking at your door or apparently leaving the message in your […]
Visibility and Anomaly Detection in The Age of Iot
By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the […]
Hacker House exposes major security flaw in US election voting machines
DEMOCRACY IS NOT A GAME …Unless you’re placing your vote on a popular electronic voting machine – one used in at least 16 US States during local State and county elections in […]
How Cybersecurity Became a Major Issue for Your Business’ SEO
By Chester Cybersecurity is no longer a niche issue that you can afford to ignore. Every year, half of all businesses report being hacked, and this can cause huge problems […]
So, Ya Wanna Be A Pen Tester, Huh?
Here are some things to consider By D. Greg Scott, Author of Bullseye Breach and Virus Bomb Do you like tearing software apart and putting it back together again, stronger […]
How to Suggest Your Manager to Invest into Cyber Defense?
By Milica D. Djekic The first personal computers would appear in the early 80s of the 20th century. Since then the entire technological posture has changed and evolved so rapidly, […]
Modernize the Mission: Implementing TIC 3.0 and Zero Trust Networking
By Stephen Kovac, Vice President, Global Government Head of Corporate Compliance, Zscaler, Inc. Today’s workplace functions on the expectation of mobility – work from any device at any location. While […]
Improving Quality And Security With Binary Analysis
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction: Companies serious about quality, safety, and security need to manage the risks in their supply chain, including software such as commercial of […]
Adding Efficiency to Security
By Dave Thompson, Senior Director, Product Management, LightCyber The words “operational efficiency” and “security” are generally not commonly used together. I’m amazed that after 20 years in the networking/network security […]
How to Defend Against the Next DDoS Attack
By Cricket Liu, Chief DNS Architect at Infoblox I’m sure you’ve been following the news of the recent distributed denial of service (DDoS) attack against Dyn. Here’s my take on […]
It’s the Industry Titans Against the Federal Deities
Ensuring zero intrusion with best practices in the encryption software industry By Anamika Kumari, Content Writer, Allied Analytics LLP Veracrypt tracked the success route of Truecrypt with great agility. The […]
Mission Critical Security and the Rise of the Private Internet of Things
By Stewart Kantor, CFO/President, Ondas Networks We live in a world where constant data connectivity has become the standard, allowing us to access information from any number of devices operating […]
The Great Tech Transfer—A Success Story in Innovation
By John Shearer, Co-Founder, and CEO, DarkLight Solving business challenges often requires innovation, but fostering creativity and growing new technologies is a challenge in itself. Creating new services and products […]
Data Availability: Laying the Digital Foundation for a More Intelligent Business
Building strong digital foundations that focus on data availability will be vital to the future of every organization. They must implement effective intelligent data management strategies that help them be […]
Six Reasons to Rethink Secure Remote Access
By Etay Bogner, VP, Zero-Trust Products, Proofpoint Whether you are the IT manager of a growing startup company or a midsize enterprise, you have probably already faced the increasing demand […]
Even NASA Has Issues!
Listed Vulnerabilities Need to be addressed By Charles Parker, II; Cybersecurity Lab Engineer From a young age, we become acquainted with NASA through its missions to the Moon, Mars, Saturn, […]
High Schools Are Not Exempt From Attack
San Diego USD By Charles Parker, II; Cybersecurity Lab Engineer High schools are much like universities and colleges, in that these hold a mass amount of data which may easily […]
Investing In SIEM: How Your Business Can Improve Threat Detection and Response
By Chester Avey, Cyber Security Specialist, Independent. Despite continual advancements in security technologies to protect businesses from cyber threats, there remains no silver bullet to completely prevent breaches. And that’s […]
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new […]
Still Misconfiguring Servers…
Addressing the Addressable By Charles Parker, II; Cybersecurity Lab Engineer When academics and students are writing papers, research is required. The research not only focused on the germane topic, however, […]
Security in Orbit: Addressing the Current State of Satellite Security
By Geoff Pierce, Chief Information Security Officer, Centauri With 5G finally starting to roll out across the country, the anticipation for new IoT applications continues to build. With that anticipation […]
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both […]