The US Government is going to respond to the SolarWinds hack very soon
The US is going to respond to the SolarWinds supply chain attack within weeks, national security adviser Jake Sullivan told CNN. The US will respond within weeks to the devastating SolarWinds…
Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence
By Udi Levy, CEO & Co-Founder at Cobwebs Technologies With a growing number of malicious cyber activities, threat intelligence has become an integral part of many organizations. Most threat intelligence…
Hackers attempted to poison the water supply of a US city
Pinellas Sheriff revealed that attackers tried to raise levels of sodium hydroxide, by a factor of more than 100, in the Oldsmar’s water supply. The scenario described by Pinellas Sheriff…
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site…
Amidst Election Noise, Cybercriminals See an Opportunity with Retail
By Chris Kennedy, CISO & VP of Customer Success, AttackIQ More than seven months into the onset of the novel coronavirus, it feels strange to look back on the things…
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear…
Zero Trust Model Is Meaningless Without TLS Inspection
Protecting users against modern, invisible cyber threats By Babur Khan, Technical Marketing Engineer at A10 Networks A security strategy is only as strong as its weakest point. No matter how…
How To Protect Your Self-Driving Car From Potential Cyber Threats
Automotive Cyber Threats By Okonkwo Noble, travel enthusiast, Writer, and Electrical Electronics Engineer, Limo services U.S.A With the increasing reliance on technology in most global economic sectors, the transportation industry…
Measuring Cybersecurity Systems Durability
By Joseph Kirkpatrick, President, Kirkpatrick Price Developing sound cybersecurity systems is a complex, multi-faceted task– but a crucial one. Not only do these systems help businesses meet their regulatory requirements,…
3 Steps to Reimagine Your AppSec Program
By Jake Reynolds, Product Manager at NetSPI and Nabil Hannan, Managing Director at NetSPI With Continuous Integration/Continuous Deployment (CI/CD) increasingly becoming the backbone of the modern DevOps environment, it’s more…
The Four Insights Network Metadata Can Reveal About Your Compromise Level
Why Network Metadata is an Underappreciated and Undervalued Threat Intelligence Resource By Ricardo Villadiego, CEO of Lumu Modern security teams are not unlike the tenacious forensic investigators featured on many…
Are Your Corporate Networks Ready for An Impending ‘Return to Work’ Cyber Attack?
As employees rejoin the network, cyber risks are heightened. Why it’s important to have essential security measures in place before it’s too late. By Stephen Burke, Cyber Risk Aware CEO…
Manual vs. Automatic Cybersecurity Testing: What’s the Difference?
By Tamir Shriki, Customer Operations Manager, XM Cyber In the context of cybersecurity, if you want to protect something, you need the ability to test its defenses. It’s the only…
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on…
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been…
Post COVID-19: Cloud, Remote Work and BYOD Security Predictions
By Anurag Kahol, CTO and co-founder, Bitglass Cloud adoption has already been growing rapidly, but we’ll see a sharp increase in adoption in 2020 as a result of the global…
How To Fight A Virus: Lessons From Cybersecurity
By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as…
Managing Small Business Cybersecurity During Covid-19
By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote…
The Race to Pivot Around Remote Work and The Emergence Of SASE
By Amit Bareket, CEO and Co-Founder of Perimeter 81 When Kodak completely neglected the rise of digital photography (an idea that Kodak itself invented) and then continued to willfully drive…
The Ransomware Age and How to Fight It
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption…
Mitigating Against Ransomware: Don’t Let Backups Be the Back Door
By Rick Vanover, Senior Director, Product Strategy, Veeam The damage ransomware can inflict on businesses is staggering. For businesses who feel they have no choice but to pay cybercriminals in…
Still Using Spreadsheets to Manage Your Digital Certificate Security?
Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital…
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success…
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can…
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: …
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to…
Malware – A Cyber Threat for 2020
By Pedro Tavares, Founder of CSIRT.UBI & Editor-in-Chief seguranca-informatica.pt We are facing a transition to a new decade. The maturity in the field of cybersecurity is growing, but a wave…
Is Data Loss Prevention (DLP) Really Dead?
By Uzi Yair, Co-founder GTB Technologies, Inc. I recently came across several digital security vendor sites that describe themselves as a “DLP alternative.” Perusing through their pages, I came across…
Cyber Prevention Is No Panacea
Detection is Key When Prevention Fails By Tony Cole, CTO, Attivo Networks Last year Gartner estimated cybersecurity spending to grow to $124 Billion US dollars globally, and by 2021 to…