How Real-Time Asset Intelligence Enables Full Posture Control
By Ellen Sundra, VP of Americas Systems Engineering, Forescout Technologies The massive growth of devices hitting our networks is not a secret or a new discussion. We have all seen […]
The Dangers of the Integrated Home/Workplace
Personal data breaches are one of the fastest-growing cybercrimes in the US. As IoT devices become increasingly common at home and in the workplace, measures must be taken to secure […]
Stop! Vulnerable Software
Know your vulnerabilities By Joe Guerra, M.Ed, CySA+, C|EH, Cybersecurity Instructor, Hallmark University Software is omnipresent, even in areas you wouldn’t envision Software so effortlessly meshes into the cloth of […]
Server less Security Analysis: The Best Practices on How to Enforce Them
By Aaron Chichioco, content editorial manager/web designer, Design Doxa Even before companies started making the jump to go serverless, security has already been a concern in a world largely becoming […]
Protecting Your Business against DDoS Attacks Requires Simple Best Practices
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the twenty years since a University of Minnesota computer came under attack from a network of over 100 […]
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to […]
Ready Position – Proactive Teams are Helping Solve the Cyber security Skills Shortage
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Some of the fans glancing toward the outfield at a baseball game may be recalling their own Little League days. […]
Public Sector Beware: 3 Steps to a Better Cyber attack Prevention Strategy
By Phil Richards, CISO, Ivanti Just as healthcare organizations were a popular target of ransomware attacks over the past two years, public sector organizations (including school districts, municipalities and local […]
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for […]
Ransomware: A Municipality’s Achilles Heel
By Russ Cohen, Vice President of Cyber Services, Chubb From large metropolitan cities like Atlanta to smaller communities like Key Biscayne, every city in America is vulnerable to cyber-attacks. In […]
New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom
Another US city was the victim of a ransomware attack, this time crooks hit the city of New Bedford, Massachusetts, asking for $5.3 Million Ransom, but… The systems of New […]
XKCD forum data breach impacted 562,000 subscribers
The popular webcomic platform XKCD has suffered a data breach that exposed data of its forum users, the incident impacted 562,000 subscribers. XKCD is one of the most popular webcomic […]
Have You Asked your eDiscovery Vendor
These 6 Essential Data Security Questions? By Brian Schrader, Esq., president, and CEO, BIA In today’s world of ever-increasing data theft, network hacks and other cyber threats, companies of all […]
Artificial Intelligence-Driven Situational Awareness
By Milica D. Djekic Once you get into the new environment you would begin digging in the darkness trying to figure out what is happening there. Maybe you would cope […]
Security Research as an Anti-Malware Secret Weapon
By Milica D. Djekic Any malware being known to the cyber community or still getting the status of the advanced persistent threat is the potential risk to your IT asset. […]
US cyberattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf
The United States cyber army carried out a cyberattack in June on a database used by Iran’s Islamic Revolutionary Guard Corps to plot attacks on oil tankers in the Gulf. […]
Preventing Business Email Compromise – a $300 Million Dollar Problem
Organizations Heavily Invested in Security Solutions Fall Victim to Social Engineering Attacks and Human Error By Ameet Naik, Director of Product Marketing, Armorblox A recent report from the Financial Crimes […]
The Need of Automatics and Control in Incident Response
By Milica D. Djekic The incident response as a cyber defense active measure could require the highly skillful IT security professionals who should get capable to detect, handle and mitigate […]
Top 5 Questions about the Capital One Data Breach
By Ilia Sotnikov, Vice President of Product Management, Netwrix Data breaches that affect financial institutions always become hot topics to discuss. The recent hack at financial giant and credit card […]
Expert found Russia’s SORM surveillance equipment leaking user data
A Russian security researcher has found that hardware wiretapping equipment composing Russia’s SORM surveillance system had been leaking user data. The Russian researcher Leonid Evdokimov has found that hardware wiretapping […]
Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
By Pratik Kirve, Sr. Specialist – Content Writer, Allied Analytics Irrespective of the kind of business you are running, the importance of digital systems and the Internet for your daily […]
7 Steps to Protect Yourself Against Corporate Spear Phishing
Anyone with an email account has been subject to spam. It happens so quickly, one day you get that first piece of unsolicited email and then the next you’re being […]
Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced […]
Why “Cloud Security 101” Isn’t So Simple After All
By Josh Stella, co-founder, and CTO of Fugue The term “cloud misconfiguration” may not seem like an adequate term to describe the leading cause of cloud data breaches. It connotes […]
What Other Companies Can Learn from Facebook’s $5 Billion Fine
Organizations need to view government demands as the floor rather than the ceiling when it comes to protecting consumer data By Jacob Serpa, researcher, Bitglass While Facebook’s $5 billion settlement […]
Conversation Marketing Security Pitfalls and Best Practices
By Morey Haber, CTO & CISO, BeyondTrust According to Gartner’s recent ‘AI and ML Development Strategies’ study, 40% of organizations cite customer experience (CX) as the number one motivator for […]
5 Most Disastrous Ransomware Attacks of the Last Decade
In the past few years, we have seen a massive change in the hacking industry. Let’s take a look at the most dangerous ransomware attacks and how to stay safe […]
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it […]
Multi-Factor Authentication and Mobile Devices
Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the […]
Veiled Vulnerability
AD By Charles Parker, II In this day, there are vulnerabilities throughout the environment. These are blatant with malicious websites and more camouflaged as with phishing and ransomware. With another […]