Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to […]
5 Key Differences between Software and Hardware Vulnerability Mitigations
By Anders Fogh, Senior Principal Engineer at Intel The software stack has long been a fruitful target for hackers looking to exploit organizations – and this is not likely to […]
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for […]
Ransomware: A Municipality’s Achilles Heel
By Russ Cohen, Vice President of Cyber Services, Chubb From large metropolitan cities like Atlanta to smaller communities like Key Biscayne, every city in America is vulnerable to cyber-attacks. In […]
Have You Asked your eDiscovery Vendor
These 6 Essential Data Security Questions? By Brian Schrader, Esq., president, and CEO, BIA In today’s world of ever-increasing data theft, network hacks and other cyber threats, companies of all […]
Ways to Protect Sensitive Data Online
By Ebbe Kernel, data mining researcher & writer The world has witnessed a number of high-profile data breaches over the last couple of decades. While the impact of these breaches […]
Security Research as an Anti-Malware Secret Weapon
By Milica D. Djekic Any malware being known to the cyber community or still getting the status of the advanced persistent threat is the potential risk to your IT asset. […]
Preventing Business Email Compromise – a $300 Million Dollar Problem
Organizations Heavily Invested in Security Solutions Fall Victim to Social Engineering Attacks and Human Error By Ameet Naik, Director of Product Marketing, Armorblox A recent report from the Financial Crimes […]
The Need of Automatics and Control in Incident Response
By Milica D. Djekic The incident response as a cyber defense active measure could require the highly skillful IT security professionals who should get capable to detect, handle and mitigate […]
Top 5 Questions about the Capital One Data Breach
By Ilia Sotnikov, Vice President of Product Management, Netwrix Data breaches that affect financial institutions always become hot topics to discuss. The recent hack at financial giant and credit card […]
Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
By Pratik Kirve, Sr. Specialist – Content Writer, Allied Analytics Irrespective of the kind of business you are running, the importance of digital systems and the Internet for your daily […]
Conversation Marketing Security Pitfalls and Best Practices
By Morey Haber, CTO & CISO, BeyondTrust According to Gartner’s recent ‘AI and ML Development Strategies’ study, 40% of organizations cite customer experience (CX) as the number one motivator for […]
Better Safe than Sorry: How to Protect Yourself While Shopping Online
By Bailey Newman, Content Team, CouponChief.com We may think nothing of filling out forms and providing data to eCommerce sites, social media sites, and public forums, but thieves and swindlers […]
5 Most Disastrous Ransomware Attacks of the Last Decade
In the past few years, we have seen a massive change in the hacking industry. Let’s take a look at the most dangerous ransomware attacks and how to stay safe […]
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it […]
Multi-Factor Authentication and Mobile Devices
Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the […]
Veiled Vulnerability
AD By Charles Parker, II In this day, there are vulnerabilities throughout the environment. These are blatant with malicious websites and more camouflaged as with phishing and ransomware. With another […]
NK is the new Iraq?
By Rodrigo Ruiz Referring to the television series Orange is the new black, I can not but consider it very convenient to blame the North Koreans for the worldwide incident […]
Trump’s Cyber security Executive Order: A Promising Start to Securing Digital Infrastructure…But Don’t Forget What’s Beyond the Firewall
By Lou Manousos, CEO, RiskIQ After some high-profile cyberattacks and information breaches, the cybersecurity posture of the U.S. government has never been more front and center in the public consciousness. […]
5 ways small businesses can be affected by a cyber security breach
By Asher de Metz A large-scale cybersecurity breach is hugely damaging for any organization, and with hackers becoming increasingly sophisticated, the chances of getting caught out are constantly growing. No […]
How context-aware security adds layers of protection to single sign-on services
By François Amigorena, CEO, IS Decisions Single sign-on, to the user, is a godsend. No more wasting time putting in passwords to individual sites or applications, no more trying to […]
Reducing the attack surface: how to empower your staff while keeping your network secure
By Pascal Bergeot is CEO of Goverlan Goverlan’s Pascal Bergeot considers what the recent Google Document hit means for remote workers and advises what companies need to do to reduce […]
The intelligent control systems and their perspectives
By Milica D. Djekic The current industry would deal with many intelligent and even smart mechatronics solutions. Also, those sorts of solutions would be used as part of smart homes, […]
Part III: Current and Future IoT Threats
The relationship between IoT and Wi-Fi By Ryan Orsi, Director Product Management, WatchGuard Technologies In parts one and two of this series, I covered the importance of understanding the anatomy […]
The Risks (and Prevention) of Crime-as-a-Service in Healthcare
By Kurt Long, Founder, and CEO, FairWarning The recent study from the Brookings Institution detailing that 25 percent of hacking attempts will focus on healthcare data should serve as a […]
Mastercard data breach affected Priceless Specials loyalty program
Mastercard disclosed a data breach that impacted customer data from the company’s Priceless Specials loyalty program. The American multinational financial services corporation notified the data breach to the German and Belgian Data […]
Moscow’s New Cable Car closed due to a ransomware infection
Two days after Moscow opened a new cable car system hackers infected its computer systems with ransomware. The cable car system is long over 700 meters and spans across the Moscow […]
USB drives are primary vector for destructive threats to industrial facilities
USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published on by Honeywell, malware-based attacks against industrial facilities mostly leverage […]
Kenya opposition claims election results manipulated in cyber attack
Kenya opposition claims hackers have manipulated the results of the recent election by breaking into the database of Kenya’s electoral commission. According to Kenya opposition, led by Raila Odinga, hackers have manipulated the […]
Irish electricity transmission system operator EirGrid targeted by a nation-state actor
The Irish electricity transmission system operator EirGrid was targeted by a state-sponsored actor, the hackers weren’t discovered at least for two months. The Irish electricity transmission system operator EirGrid was […]