Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions
Provide Users Fast and Secure Connectivity from Anywhere with the Leading SASE Platform Based on Containerization for Complete Data Isolation With increasing bandwidth, encrypted traffic, shifts to cloud applications like […]
Business Email Compromise – Why Is It Dangerous and How to Avoid It
By Elena Georgescu, Communication & PR Officer at Heimdal™ Security When talking about business email compromise, we cannot omit to mention two aspects: technology and money. Technology is the engine […]
Centrify Study Lifts the Hood on Cybersecurity Policy and Threat Challenges During COVID-19
Recent study shows increased breaches in cybersecurity led nearly 40% of UK business decision makers to dismiss staff members since the start of the pandemic By Andy Heather, VP and […]
Funding Schemes and Cyber Security
By Milica D. Djekic What a lovely day; you are just searching your web for some online business opportunities or you are reviewing the cyberspace to get the stipend for […]
Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy
By Joanne Godfrey, Security Evangelist, ZeroNorth Companies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But […]
The “New Normal” – Navigating Remote Work and Security in the COVID-19 Era
By Bill Delisi, CEO of GOFBA There are many “new normal” that apply to different parts of life and certain industries. For cybersecurity, a core change to the landscape is […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Compliance in A Connected World
By Kirsty Fisher, CFO, Titania In 2019, Microsoft made waves at its annual Black Hat conference in Las Vegas, where it confirmed its discovery of a malicious hacker group that […]
Smart Gadgets in Proving Workplace Violence
By Milica D. Djekic The violence at the workplace could start as the common insult, continue as the verbal abuse and end up as the mobbing attack that could get […]
Is API Usage Putting Your Organization Out of Compliance?
By Matt Keil, Director of Product Marketing, Cequence Security APIs (“Application Programming Interfaces”) are increasingly being used as the conduit for data exchange between applications, infrastructure, and IoT devices. The […]
Why Academic Openness and A Rise in Online Classes Should Invoke A Renewed Focus on Security
By Anthony Bettini, CTO, WhiteHat Security For decades, researchers and students from around the world have come to study and collaborate, research, and innovate at American universities and colleges under […]
Ransomware, Risk, And Recovery
Why You Need to Take A Hard Look At Your Corporate Recovery Plan By Mickey Bresman, CEO, Semperis What we as IT and security professionals worry about when planning […]
Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce
By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential […]
Cyber Warfare and its impact on businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments, and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
Cybersecurity Challenges When Working from Home
By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in […]
Iphone Extraction Without A Jailbreak
Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied […]
How To Fight A Virus: Lessons From Cybersecurity
By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as […]
Managing Small Business Cybersecurity During Covid-19
By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote […]
Software-Defined Perimeters Offer Secure Connectivity to Smart Cities
By Don Boxley, CEO, and Co-Founder, DH2i (www.dh2i.com) Smart cities are on the rise—in a really big way. According to Microsoft, smart-city initiatives—which can be defined as cities that rely […]
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn […]
How Pizza Can Be the Recipe to Understand Cloud Security
By Yohanan Berros, Customer Operation Managers, XM Cyber It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises […]
Economic Efficiency in Cyber Defense
By Mark Evans, VP Marketing, Endace The previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series […]
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success […]
Enabling Agility to Accelerate Incident Response
By John Attala, Vice President of Worldwide Sales, Endace In the first article in this series, Endace VP of product management Cary Wright discussed the importance of end-to-end network visibility […]
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can […]
Your Passwords Have Already Been Hacked
Time to Remove the Ticking Time Bomb From Your IT Security Strategy By Shahrokh Shahidzadeh, CEO, Acceptto There was a time where dozens of stolen passwords or digital credentials would […]
How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred […]
For A Fully Rounded Defence, Automate
By Karen Levy, Vice President, Product and Client Marketing, Recorded Future Cybercriminals are now running their operations in a way not dissimilar to modern legitimate businesses. Criminal groups have organizational […]
Cyber Leads Global Business Risks for First Time: Allianz Risk Barometer 2020
By Kelly Castriotta, North American Head of Product Development for Financial Lines at Allianz Global Corporate & Specialty For the first time ever, Cyber incidents (39% of responses) ranks as […]