Magecart May Make Holidays Less Merry

Third-party plug-ins driving most retail sites can open doors to attackers by Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks In the unprecedented year of 2020, the rise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Magecart May Make Holidays Less Merry

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

Has Your Data Been Leaked to the Dark Web?

By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Has Your Data Been Leaked to the Dark Web?

Why Endpoint Protection Should Be a Security Priority

Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Endpoint Protection Should Be a Security Priority

How Can CISOs Work with CMOs to Secure Social Media?

By Otavio Freire, CTO & Co-Founder, SafeGuard Cyber Recent reports indicate that over half of the global population now uses social media – up 10.5% on last year’s 3.5 billion […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How Can CISOs Work with CMOs to Secure Social Media?

Building Trust: The Path to True Security Synergy Between Appsec And Developers

By Matias Madou, co-founder and CTO, Secure Code Warrior A relationship that is built on the shaky foundations of mistrust is, well, best approached with low expectations. Sadly, this can […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Building Trust: The Path to True Security Synergy Between Appsec And Developers

Acronis Cyber Readiness Report

Pandemic reveals cybersecurity gaps, need for new solutions By Peter Hale, Sr. Content Manager, Acronis As businesses around the world reacted to the COVID-19 pandemic, many had to address new […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Acronis Cyber Readiness Report

Weaknesses of Biometric Authentication

By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever.  The democratization of digital […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Weaknesses of Biometric Authentication

Getting Employees Back to the New Normal

Work will never be quite the same once the pandemic has passed By Brendan O’Connor, CEO, and Co-founder, AppOmni There are encouraging signs that the Covid-19 pandemic – arguably the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Getting Employees Back to the New Normal

Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

Cybersecurity Challenges When Working from Home

By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Cybersecurity Challenges When Working from Home

Everything You Want to Know About Single Sign-On

By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Everything You Want to Know About Single Sign-On

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X