Cybersecurity in Healthcare: Benefits, Examples, and Usage Tips Healthcare cybersecurity framework
By Kate Orekhova, Cleveroad company Health organizations deal with a large amount of sensitive personal information. That’s why they face challenges complying with tightening regulations, and they’re constantly combating increased…
All the User Experience, None of The Security?
EU telcos gather a lot of highly sensitive customer information. New research suggests it’s not as well protected as you might think. By Deepika Gajaria, Vice President of Product, Tala…
In the Midst of COVID-19, We’re Seeing a Pandemic of Cyber Attacks
By Babur Khan, Technical Marketing Engineer – Enterprise Security at A10 Networks In the first quarter of 2021, the COVID-19 pandemic is still wreaking havoc around the globe. The coronavirus…
Three things’ organizations must do to secure “passwordless”
By Jerome Becquart, COO, Axiad The pandemic forced organizations to accelerate their journey to passwordless with secure authentication methods such as multi factor authentication (MFA), as individuals were expected to…
REvil ransomware gang hit US nuclear weapons contractor Sol Oriens
The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole the victim’s data. US nuclear weapons contractor Sol Oriens was…
G7 calls on Russia to dismantle operations of ransomware gangs within its borders
The member states of the G7 group have called on Russia and other states to dismantle operations of the ransomware gangs operating within their countries. G7 member states have called…
Uncovering hidden cybersecurity risks
By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical vulnerabilities in their software and firmware, lurking just beneath the surface of…
Data Loss Prevention in Turbulent Times
By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This probably understates the case: Not only is data at the core of…
StayHackFree – Your Kid’s Sports Team
Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s Hockey team has better management than your Cyber Security team. Really, I…
Executive Protection Needs to Include Digital
By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks and dangers inherent to their executives’ security. Executive Protection is an established…
A dozen Android apps exposed data of 100M+ users
Check Point researchers found 23 Android apps that exposed the personal data of more than 100 million users. Security researchers from Check Point have discovered 23 Android applications that exposed…
How to Prevent Ransomware Attacks On Industrial Networks
Insights into Ransomware attacks, how they spread in industrial networks, and how to prevent them from happening. By Michael Yehoshua, VP of Global Marketing, SCADAfence Since the outbreaks of Wannacry &…