The Public Cloud. Is It Secure?
GTB Technologies, Inc. The Data Protection Company In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store […]
Enterprises Demand MSSPs Offering MDR Services Through Cybersecurity Convergence
By Arun Gandhi, Director of Product Management of the Seceon Enterprises from all verticals are embracing digital transformation. This new, increasingly connected digital world is bringing tremendous efficiencies to the […]
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly […]
World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale. […]
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read, […]
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls […]
A Terrifying Diagnosis: Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
By Pieter Danhieux, Co-Founder and Chairman/CEO of Secure Code Warrior Cyberattacks have become a way of life these days. People almost expect to hear news about some new vulnerability or […]
How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that. […]
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal […]
5 Recruitment Predictions in Cybersecurity For 2020
By Karl Sharman As we prepare for more figures to be produced saying the amount of jobs unfilled has increased by another 20%, I want to challenge every person in […]
DivvyCloud 2020 Predictions
By Chris DeRamus, CTO and co-founder, DivvyCloud Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, […]
Iot Security and Privacy
Security and Privacy in the IoT age By Lokesh Yamasani, Director – IT Security (Security Officer), Satellite Healthcare We are living in a digital age, let alone the so-called “Age […]
8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report […]
It’s Time for A Tough Conversation About Trust
By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks, […]
The Email Security Challenges
By Milica D. Djekic Let’s try to remember the times of the old, good letters when the postman was knocking at your door or apparently leaving the message in your […]
The Rise of Cybercrime-As-A-Service
And What It Means for Businesses By Mark Belgrove, Head of Cyber Consultancy, Exponential-e In a sea of increasingly complex cyber warfare and nation-state hackers, it can be easy to […]
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days […]
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once […]
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities and local governments in Texas were hit by a coordinated ransomware attack. The hackers […]
Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?
A brief interview summary from the Digital Transformation EXPO Europe 2019 London, England – There’s a tremendous amount of buzz surrounding A.I. these days. Some believe it will present us […]
3-D Secure: The Legacy Protocol Making a Comeback to Secure Online Payments
By Jennifer Singh Consumers today are spoiled for choice – which clothes to wear, gadgets to buy and payment networks to use to acquire these goods. The competition is tight […]
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that […]
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and […]
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
By Yasir Liaqatullah, vice president of product management at A10 Networks A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access to the software as a […]
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity […]