Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to be fought on two fronts – on the ground and in the ether – […]
Top 10 Node.Js Security Best Practices
Best Security Practices in Nodejs By Harikrishna Kundariya, CEO, eSparkBiz Node.js is one of the most popular frameworks for web and mobile application development. It is JavaScript runtime which works […]
The Truth About Data Privacy in Healthcare
Realizing the value of personal data and the risk of connected healthcare as bad actors prevail in their attacks against Healthcare Delivery Organizations (HDOs) By Samuel Hill, Director of Product […]
How to Fix Mid-Market Security Using Intelligent Automation and AI
By Guy Moskowitz, CEO, Coro Market forces are working against medium-sized businesses, leaving companies that don’t have large, dedicated security teams and fat cyber security budgets exposed to cyber threats. […]
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to the cybersecurity industry By Bryon Kroger, Founder of Rise8 Following the […]
Why the Future of Threat Detection and Prevention is Unified Security and Risk Analytics
Why True AI/ML Capabilities are Essential for Next-Gen Risk Analytics By Sanjay Raja, VP of Product Marketing at Gurucul As cloud adoption continues to grow and remote work becomes the […]
Is XDR The Right Solution for Today’s Security Threats?
Defining XDR’s Role in the Security Stack By Steve Garrison, VP Marketing, Stellar Cyber XDR and Open XR are two of the latest buzzwords in the cybersecurity tools market, but […]
3 Cybersecurity Certainties for 2022
By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency […]
Ransomware — Encrypt Your Data Before Others Do
Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A single malicious email, with the sender of the mail disguised as a […]
How Do I Reliably Identify You If I Cannot See You?
eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a process used around the globe for many years to validate the identity […]
Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one. By Eric Sivertson, VP of Security Business Development, Lattice Semiconductor The National Vulnerability […]
Why The Integration of Netops And Secops Is Here To Stay
By Eileen Haggerty, Sr. Director, Enterprise Business Operations, NETSCOUT The pandemic accelerated digital transformation and increased organizations’ reliance on cloud services, VPNs, and other solutions designed to support remote work. […]
Digital Transformation Security: Guidelines for Success
By Yehudah Sunshine, Head of PR, odix With the workforce going remote and IP existing almost exclusively in the digital domain enterprises, local and federal agencies, and SMBs alike are […]
Protecting SMBs from Current Cybersecurity Threats
A Few Small Practices Can Have a Large Impact By Mike Mosher, Director of Technology, Cinch I.T. If you own a small or medium-sized business, you are a target of […]
Making Sure the Lights Don’t Go Out
By Brett Raybould, EMEA Solutions Architect at Menlo Security The ransomware attack on Colonial Pipeline, the largest fuel pipeline in the US has shown just how vulnerable the energy industry […]
Why XDR is Not Enough
By Guy Rosefelt, Security CMO, Sangfor Technologies What is XDR? One of the latest trends in cybersecurity is Extended Detection and Response, more commonly known as XDR. Although originally defined […]
StayHackFree – Your Kid’s Sports Team
Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s Hockey team has better management than your Cyber Security team. Really, I […]
Contactless Passwordless Auto Login
with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, CEO of Freemindtronic On a daily basis, every company, regardless of its […]
Executive Protection Needs to Include Digital
By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks and dangers inherent to their executives’ security. Executive Protection is an established […]
The Case for Open XDR
The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect […]
Secure Data Recovery Services: Protecting Business Continuity
By Dmitri Kardashev, Founder and CEO, SecureData, Inc. In today’s world, consumers and businesses alike require consistent and easy access to their data. Whether it’s large customer databases that an […]
China-linked APT uses a new backdoor in attacks at Russian defense contractor
China-linked APT group targets Russian nuclear sub designer with an undocumented backdoor A China-linked cyberespionage group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy. […]
Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021
An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released […]
Rise of BYOD Once Again
By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]
Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]
How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy
By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work, […]
China-linked APT31 group was behind the attack on Finnish Parliament
China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. China-linked cyber espionage group APT31 is believed to […]
Protect Your Organisation Against the Threat of Magecart – The Steps Towards Mitigation
By Pedro Fortuna, CTO, Jscrambler Magecart has certainly garnered mainstream media attention over the last couple of years. Perhaps it’s the high profile nature of many of their targets (British […]
Working from Home? You’re Not Alone
The rise of cyber hacks in an age of remote working – and how to prevent them By Steve Hanna, Embedded Systems Work Group Co-Chair at Trusted Computing Group (TCG) […]
Security and Remote Management: What Is the Market Looking Like as We Head Towards 2021?
By Gil Pekelamn, CEO, Atera For many IT professionals and managed service providers (MSPs), remote management has always been part of the deal. Especially in this generation’s global economy, service […]