Cleaning up “Dirty” Wi-Fi for Secure Work-from-Home Access
By Matias Katz, CEO, Byos A great deal of emphasis has been placed on the use of VPNs to help provide safe, secure connectivity during this historic COVID-19 crisis and […]
Cyber-Secure Access Control Solutions for Workplaces
By Imran Anwar FBI has reported a 400% increase in cybercrime reports during the COVID-19 pandemic. Cybersecurity has become a big challenge for business owners while they try to keep […]
Ensuring Cybersecurity in A Remote Workplace
How to Make Sure your Remote Team is Secure By Ryan Ayers, Freelance Writer & Tech Consultant With e-commerce at an all-time high in the wake of the COVID-19 lockdown, […]
Top 5 Coronavirus Scams
By Zack Schuler, founder and CEO of NINJIO One of the reasons NINJIO content is so successful at capturing and holding employees’ attention is its relevance – we release new […]
A Cyber Approach to Coronavirus Containment
By Zohar Rozenberg What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign? In recent years, some in the cyber world recognize […]
How To Manage Your Small Business In Time Of Crisis
By Milica D. Djekic It’s always a challenge to manage your small business, but especially in times of crisis. Such a situation requires special skills, such as crisis management skills, […]
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn […]
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success […]
Enabling Agility to Accelerate Incident Response
By John Attala, Vice President of Worldwide Sales, Endace In the first article in this series, Endace VP of product management Cary Wright discussed the importance of end-to-end network visibility […]
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can […]
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: […]
Best Practices for Better SOC Analysis
By Chris Calvert, co-founder, Respond Software Security analysts are a breed apart. They work long hours, using their intelligence and attention to detail to sort false alarms from real threats. […]
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to […]
Not All Secure Certificates Created Equal
By Cal Evans, Developer and SiteGround Ambassador Data security is essential for every person who uses the Internet, but if you have your own site, the stakes are even higher. […]
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to […]
How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred […]
For A Fully Rounded Defence, Automate
By Karen Levy, Vice President, Product and Client Marketing, Recorded Future Cybercriminals are now running their operations in a way not dissimilar to modern legitimate businesses. Criminal groups have organizational […]
Facebook’s $550 Million Settlement: A Warning to Companies Collecting Biometric Data
Facebook’s significant settlement could incite future class action lawsuits, further emphasizing the need for companies to comply with biometric privacy laws. By Billee Elliott McAuliffe, Member, Lewis Rice Thanks to […]
Practical Vulnerability Remediation Strategies
By Syed Abdur, Brinqa Cyber vulnerabilities have a way of piling up. Vulnerability assessment and scanning tools report them in droves from every corner of the technology infrastructure – network, […]
Lifecycle Assurance for Platform Integrity and Security
By Tom Garrison, Vice President and General Manager of Client Security Strategy Today’s supply chains are global, complex, and often lack transparency. This creates a variety of challenges, from design […]
Modernizing Government Processes Requires Modern Cybersecurity Practices
By Anthony Bettini, CTO, WhiteHat Security According to IDG, 89% of companies have recently adopted a digital-first business strategy or plan to do so. As part of this pattern, the […]
Smart Buildings
Understanding the Security Risk By Andrea Carcano, Nozomi Networks Co-founder and CPO Smart Buildings: Understanding the Security Risks Today many of the world’s most forward-thinking workplaces are deploying smart technologies […]
Network Security Must Keep Up with Video Surveillance Systems’ Rise in Criticality to Public Safety and Security in The Middle East
By Rabih Itani, the Middle East region security business head at Aruba, a Hewlett Packard Enterprise company The Video Surveillance market in the Middle East region continues to grow in […]
VPNs – 2020 And Beyond
By Sebastian Schaub, Founder and CEO, hide.me In the last 5 years, awareness to protect data, to encrypt communication, and minimize data collection has rapidly increased. Privacy and trust will […]
Drowning in A Sea of Threat Data? Consider A Curator
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the wake of increasing cybersecurity threats and data breaches, a whole host of network monitoring and threat intelligence […]
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources […]
Juggling Your Clouds
Managing the Federal Government’s Multi-Cloud Future By Cameron Chehreh, Chief Technology Officer, Dell Technologies Federal Driven by the recent Cloud Smart initiative, federal agencies are prioritizing cloud and on track […]
Devops – Are You Risking Security for Agility?
By Morey Haber, CTO & CISO, BeyondTrust By merging software development and IT operations ― two traditionally mutually exclusive functions ― DevOps has fundamentally transformed how today’s organizations develop, operate […]
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information […]