How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Data Migration Security

WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Data Migration Security

Perfecting Your Cybersecurity Sales Process

By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Perfecting Your Cybersecurity Sales Process

Why Endpoint Protection Should Be a Security Priority

Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Endpoint Protection Should Be a Security Priority

Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

Is What’s Lurking in Your Network About to Come Out?

The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. By Carolyn Crandall, Chief Deception Officer, Attivo Networks The COVID-19 pandemic has forced countless […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Is What’s Lurking in Your Network About to Come Out?

CRYPTO

An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on CRYPTO

A Passwordless Future: Will Biometric Identification Replace Passwords?

By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on A Passwordless Future: Will Biometric Identification Replace Passwords?

Cyber Attacks at Sea: Blinding Warships.

Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cyber Attacks at Sea: Blinding Warships.

Still Using Spreadsheets to Manage Your Digital Certificate Security?

Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Still Using Spreadsheets to Manage Your Digital Certificate Security?

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X