The Security Challenges of Robotic Process Automation—A Primer
By Kevin Ross, Global Solutions Engineer, CyberArk Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These systems enable software robots to replicate the actions […]
Cyber Safety Tips for The Holidays
Practicing Good Cyber Hygiene to Avoid Holiday Cyber Attacks By Dr. Bob Duhainy, Walden University Doctor of Information Technology core faculty member While millions of holiday shoppers will be spending money […]
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days […]
Visibility and Anomaly Detection in The Age of Iot
By Craig Sanderson, Senior Director of Security Products at Infoblox Historically, organizations have struggled to gain visibility of what users, devices, and applications are accessing their network infrastructure. If the […]
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once […]
Protecting Against Modern Cyberattacks
By Bala Sethunathan, CISO and Global Director of the Security Practice at SoftwareONE Modern cyberattacks are increasing in complexity and sophistication, as hackers are developing attack tools at a faster […]
Persistent Cybersecurity Industry Challenges: Salary Survey Finds Parity Gaps for Gender, Diversity and Trouble Sustaining Work-Life Balance
By Trevor Daughney, VP of Product Marketing, Exabeam Annually, Exabeam conducts a Cybersecurity Salary, Skills, and Stress Survey* to gain insight on trends in the salaries of security professionals, as […]
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and […]
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
By Yasir Liaqatullah, vice president of product management at A10 Networks A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access to the software as a […]
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity […]
Sprint Beta Testing 5G Smart City in Georgia
By Kayla Matthews, Freelance Writer, Productivity Bytes Sprint has started beta testing some of its new 5G technology in Peachtree Corners, Georgia. Though the test doesn’t encompass the whole city, it […]
Stressing Security Teams
By Jody Caldwell Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly complicated. People stress out when they believe that demands […]
New Cybersecurity Trend: Hackers Impersonating Other Hackers
By Jonathan Drake, Senior Intelligence Analyst at Optiv Security Cyber threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary from organization to organization, typical threat […]
Cybersecurity Essentials for Small and Medium Businesses
Protect your business from hackers by knowing some of the top cybersecurity essentials you should adapt within your organization. By Peter Porr, Marketing and Brand Manager, ImageWare Systems Both government agencies […]
How Cybersecurity Became a Major Issue for Your Business’ SEO
By Chester Cybersecurity is no longer a niche issue that you can afford to ignore. Every year, half of all businesses report being hacked, and this can cause huge problems […]
In A World of External Threats, How Are Businesses Putting Themselves In Jeopardy?
By Stephanie Douglas, Senior Managing Director, Guidepost Solutions Just about every possible facet of your personal information can be subject to compromise: credit card or social security numbers, social media […]
Simple Ways SMBs Can Protect Themselves against Cyber-Threats
By John Ford, Chief Information Security Officer, ConnectWise It seems as if every couple of weeks or so, a major news story flashes across our screens detailing a massive data […]
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts, […]
Avoiding Misinformation for Content Moderators
By Sarah Katz, Cyber Security Specialist Provided the controversy surrounding foreign fake news that allegedly influenced the 2016 presidential elections in countries such as France and the United States, concern […]
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that […]
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from […]
Where Property Insurance Ends and Cyber Insurance Begins—the Industry’s Biggest Issue More People Should Be Talking About
By Matt Prevost, Senior Vice President, Cyber Product Manager at Chubb Cyber-attacks are expected to cost companies more than $2 trillion in 2019, according to Juniper Research. Consequently, many companies—especially […]
From Guards to Detectives: Evolving the Junior Security Analyst Role
By Mike Armistead, CEO and Co-Founder, Respond Software Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human roles with the support of intelligent […]
Detrimental Ransomware Effects
Lost coursework and headaches By Charles Parker, II Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828 students, aged between 11 […]
Achieving Cybersecurity Readiness with AI-Powered, Gamified Training
By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence “THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems […]
No One Likes Passwords, So Why Are We Still Using Them?
Users Deserve Better, Websites Need to Deliver By Charles Durkin, Chief Executive Officer, Privakey Creating a new online account is a dreaded task for most internet users. Complexity and security […]
Improving Quality And Security With Binary Analysis
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction: Companies serious about quality, safety, and security need to manage the risks in their supply chain, including software such as commercial of […]