A Timely Report for a Changing World – The 2020 Verizon Mobile Security Index
As the world rapidly adapts to working remotely and virtual learning, the importance of communicating cybersecurity best practices while using mobile devices is more important than ever before. Given the […]
Not All Secure Certificates Created Equal
By Cal Evans, Developer and SiteGround Ambassador Data security is essential for every person who uses the Internet, but if you have your own site, the stakes are even higher. […]
Don’t Enable Hackers and Employees at The Same Time
By Dor Knafo, CEO, co-Founder, Axis Security When work from home went from a luxury to mandatory overnight, that put a lot of pressure on already stretched IT, teams. The […]
Debunking the Top Myths in Vulnerability Management for A Safer Enterprise
By Dr. Deepak Kumar, Founder, and CEO, Adaptiva Cybersecurity is one of the most daunting challenges enterprises will face in 2020. According to IBM’s 2019 Cost of a Data Breach Report, the […]
Practical Vulnerability Remediation Strategies
By Syed Abdur, Brinqa Cyber vulnerabilities have a way of piling up. Vulnerability assessment and scanning tools report them in droves from every corner of the technology infrastructure – network, […]
The Cyber Challenges of the 21st Century
By Emil M.Hasanov The National Cyber Strategy demonstrates my commitment to strengthening America’s cybersecurity capabilities and securing America from cyber threats. It is a call to action for all Americans […]
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just […]
Predicting the Direction of The PAM Market In 2020
A Look at What is Next on the Horizon for Securing Organizations’ Privileged Accounts By James Legg, President, and CEO, Thycotic As each year passes, we analyze the successes and […]
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources […]
Juggling Your Clouds
Managing the Federal Government’s Multi-Cloud Future By Cameron Chehreh, Chief Technology Officer, Dell Technologies Federal Driven by the recent Cloud Smart initiative, federal agencies are prioritizing cloud and on track […]
The Importance of Cybersecurity Education in The Workplace
By Aman Johal, Lawyer, and Director of Your Lawyers In the last few years, we have seen unprecedented levels of data breach activity, with cybersecurity attacks compromising the personal data […]
The Secret to Winning IT Security Roulette
By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino where the longer you stay, the more likely […]
Threat Modeling High Value Assets
By M. Michael Mitama, THETA432 We live in an era where we are continuously bombarded with marketing campaigns of the next silver-bullet that will stop “The Threat”. Overcompensation on malware […]
Thought Leaders Discuss the “Human Element” at RSA Conference 2020
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec […]
Coronavirus scams, found and explained
By David Ruiz Coronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting their loved ones. But for cybercriminals, this […]
Securing the Next Generation Data Center
By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks Securing Cloud-Generation Data Centers As many firms transition their data centers into the […]
A Green Database
By Chris Jordan, CEO, Fluency Security Datacenters are basically toxic computer equipment in a constantly cooled warehouse. Their footprint is growing across the globe in places like Loudoun County, Virginia, […]
5 Ways Hackers Can Bypass Your MFA
Think Your Sensitive Systems Are Secure? Think Again. By Dana Tamir, VP Market Strategy for Silverfort Let me start by saying – you should be using MFA (Multi-Factor Authentication) on […]
GDPR stand aside — meet CCPA!
The interactions between CCPA compliance and Security solutions. By Oren T. Dvoskin, Global Marketing Director, Sasa Software Introduction The California Consumer Privacy Act, AB 375 (”CCPA”) was enacted in June […]
The Evolution of PAM
By Mahesh Babu, Sr. Director and Head of Product Marketing at Remediant When assessing an organization’s cybersecurity posture, privileged accounts are the most critical to safeguard because of their proverbial […]
Microsoft Brings Application Isolation to Office 365 with Application Guard
Users No Longer Have to Choose Between Security and Productivity By David Weston, Director of OS Security, Microsoft At Microsoft, we spend more than $1 billion annually on security and […]
Cyber Prevention Is No Panacea
Detection is Key When Prevention Fails By Tony Cole, CTO, Attivo Networks Last year Gartner estimated cybersecurity spending to grow to $124 Billion US dollars globally, and by 2021 to […]
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read, […]
COVID-19: Disaster Preparedness for the Digital-First Business
By Otavio Freire, President, CTO and Co-Founder SafeGuard Cyber COVID-19, also known as coronavirus, is proving to be a stubborn pathogen. Tragically, the global death toll has now surpassed 3,000. […]
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls […]
A Terrifying Diagnosis: Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
By Pieter Danhieux, Co-Founder and Chairman/CEO of Secure Code Warrior Cyberattacks have become a way of life these days. People almost expect to hear news about some new vulnerability or […]
The Consumer Technology Association – What Trends Lie Ahead in the 2020’s
If one thing was made boldly apparent at the CES 2020, it’s that everything is trending toward connectivity. Soon, there will be scarcely any facet of our daily lives that […]
Not All Hackers Are Criminals, And Some of The Good Guys Can Earn A Million Dollars
Dr. Roberto Di Pietro, a full professor of cybersecurity at Hamad Bin Khalifa University’s College of Science and Engineering, explains why there is a misconception about the term ‘hackers’. The […]