New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for […]
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from […]
The best practices in dealing with ransomware
By Milica D. Djekic Our society is becoming dependable on new technologies in both – legal and illegal connotation. The hacker’s community is getting bigger and bigger and it’s right […]
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory […]
Nation State Cyber Attacks Emerge from the Shadows
By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information […]
Time to Get Serious About Internet of Things Cyber security
By Nate Lesser, Managing Director of MasterPeace LaunchPad The Internet of Things (IoT) is made up of everyday objects built with the ability to sense, analyze, and communicate information about […]
Cyber Security Risks on Social Media
By Simon Parker at Minerva Security As technology advances, social media has gained popularity over time. It has provided a platform where people can freely express their feelings and get […]
The challenges of an Internet of Things analytics
By Milica D. Djekic Through a history – we would notice the importance of good analytics in many areas of human activities. For instance, many military strategists would deal with […]
Multi-factor Authentication Implementation Options
“2FA to 5FA – What are the options available?” By David Smith Independent Consultant at Smart Card Institute At some point of time, we have all used an OTP (One-time […]
How Real-Time Asset Intelligence Enables Full Posture Control
By Ellen Sundra, VP of Americas Systems Engineering, Forescout Technologies The massive growth of devices hitting our networks is not a secret or a new discussion. We have all seen […]
The Dangers of the Integrated Home/Workplace
Personal data breaches are one of the fastest-growing cybercrimes in the US. As IoT devices become increasingly common at home and in the workplace, measures must be taken to secure […]
Stop! Vulnerable Software
Know your vulnerabilities By Joe Guerra, M.Ed, CySA+, C|EH, Cybersecurity Instructor, Hallmark University Software is omnipresent, even in areas you wouldn’t envision Software so effortlessly meshes into the cloth of […]
Ready Position – Proactive Teams are Helping Solve the Cyber security Skills Shortage
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Some of the fans glancing toward the outfield at a baseball game may be recalling their own Little League days. […]
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for […]
Ways to Protect Sensitive Data Online
By Ebbe Kernel, data mining researcher & writer The world has witnessed a number of high-profile data breaches over the last couple of decades. While the impact of these breaches […]
Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
By Pratik Kirve, Sr. Specialist – Content Writer, Allied Analytics Irrespective of the kind of business you are running, the importance of digital systems and the Internet for your daily […]
Why “Cloud Security 101” Isn’t So Simple After All
By Josh Stella, co-founder, and CTO of Fugue The term “cloud misconfiguration” may not seem like an adequate term to describe the leading cause of cloud data breaches. It connotes […]
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it […]
Lazarus: Data Leakage With Cryptographic System
By Rodrigo Ruiz & Rogério Winter You have most probably already received the recommendation or even the imposition of keeping a “strong password” in your applications. A strong password is […]
The Risks (and Prevention) of Crime-as-a-Service in Healthcare
By Kurt Long, Founder, and CEO, FairWarning The recent study from the Brookings Institution detailing that 25 percent of hacking attempts will focus on healthcare data should serve as a […]
MUGHTHESEC, a signed Mac adware that hijacks the victim’s browser for profit
Experts spotted a new signed Mac adware dubbed MUGHTHESEC that hijacks victim’s browser for profit and can be removed only reinstalling the OS. According to the expert Patrick Wardle, Director […]