Stressing Security Teams
By Jody Caldwell Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly complicated. People stress out when they believe that demands…
New Cybersecurity Trend: Hackers Impersonating Other Hackers
By Jonathan Drake, Senior Intelligence Analyst at Optiv Security Cyber threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary from organization to organization, typical threat…
How Cybersecurity Became a Major Issue for Your Business’ SEO
By Chester Cybersecurity is no longer a niche issue that you can afford to ignore. Every year, half of all businesses report being hacked, and this can cause huge problems…
Here’s How You Can Secure Your App from Cyber Attacks
By Twinkle Do you know how many people own a smartphone? Well, you’ll be shocked to know that as per the researchers estimate the total number of mobile device users…
10 Best Tips for Using Metasploit to Harden Your Network
By Tim Keary, Copywriter, Comparitech How do you know if your network is safe? Cybercrime is an everyday threat to companies. There is one hacking attack every 39 seconds. Some…
In A World of External Threats, How Are Businesses Putting Themselves In Jeopardy?
By Stephanie Douglas, Senior Managing Director, Guidepost Solutions Just about every possible facet of your personal information can be subject to compromise: credit card or social security numbers, social media…
So, Ya Wanna Be A Pen Tester, Huh?
Here are some things to consider By D. Greg Scott, Author of Bullseye Breach and Virus Bomb Do you like tearing software apart and putting it back together again, stronger…
How to Suggest Your Manager to Invest into Cyber Defense?
By Milica D. Djekic The first personal computers would appear in the early 80s of the 20th century. Since then the entire technological posture has changed and evolved so rapidly,…
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts,…
Avoiding Misinformation for Content Moderators
By Sarah Katz, Cyber Security Specialist Provided the controversy surrounding foreign fake news that allegedly influenced the 2016 presidential elections in countries such as France and the United States, concern…
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that…
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from…