Cybersecurity: Why Your Cell Phone is Your Weakest Link
The internet of things. It’s a wonderful product of society’s love of technology and needs to make daily tasks more efficient. Think about it. How many devices do you own? […]
Understanding Bluetooth and its role in the Internet of Things
By Dimitri Vlachos, VP of Marketing, Pwnie Express Bluetooth technology was originally designed for continuous, streaming data applications – essentially, it was intended to replace wires to create the possibility […]
Privacy and Security Issues in Autonomous Cars
By David Navetta, Boris Segalis, and Kris Kleiner, Norton Rose Fulbright US LLP As the development of self-driving car technology progresses, the prospect of privately-owned autonomous vehicles operating on public […]
5 mistakes hindering effectiveness of SIEM solutions: Learning from real-life cases
With a SIEM solution installed, the security department can think it’s time to grab some popcorn and watch the system perfectly dealing with all possible threats impending their networks. Ah, […]
E-Recycling: Exploring the “End-of-Life” Issues for Connected Devices
A brief digest from the E-Scrap Conference & Trade Show 2019 Orlando, FL – What happens to our beloved tech devices when they die? Wouldn’t it be great if the […]
How a Cyber Attack Could Kill Your Website – Permanently
By Phillip Adcock, Managing Director, Shopping Behaviour Xplained Ltd Shopping online has become the standard way to do things. But with many shoppers wary of online services, site owners should […]
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis […]
Securing the Hybrid Cloud: What Skills Do You Need?
By Raj Samani, chief technology officer, EMEA, Intel Security Group Hybrid cloud models offer many well-documented benefits, but they also introduce more complexity for securing data and applications across the […]
How to protect an enterprise from physical attacks
By Yana Yelina, Tech Journalist, EffectiveSoft Nowadays, none of the enterprises is immune to cyberattacks, data breaches, malware, and other types of damage. As a result, news about information leakage […]
Threat intelligence collection in a developing world
By Milica D. Djekic As it’s known – threat intelligence collection is mainly increasing in developing countries. These countries could be a source of the real risks, threats, and challenges […]
Mission Critical Security and the Rise of the Private Internet of Things
By Stewart Kantor, CFO/President, Ondas Networks We live in a world where constant data connectivity has become the standard, allowing us to access information from any number of devices operating […]
Are your critical systems lying to you? Protecting SCADA Systems from Data Forgery
By Michael Shalyt, VP Product Aperio Systems (www.aperio-systems.com) Like many things in life, the greatest cyber threat to critical infrastructure is in the things we cannot see. Both security analysts […]
The anniversary of EMV roll-out: criminals are anxious to beat the system
By Andrei Barysevich Introduced by the financial industry in the early 2000s, EMV smart payment cards have largely supplanted magnetic stripe technology, and for good reason. Due to concerns surrounding […]
The independent wireless networks
By Milica D. Djekic The wireless technologies would actively attract the researcher’s attention during the last few decades. The era of wireless information transfer has begun around two centuries ago […]
2 Sure Ways To Prevent Cyber Crime
By Laban Moturi, Blogger and Writer. From writersbase.org writing company The World has come close and closer with the usage of the internet. With the growth of this, many evils […]
Security Orchestration is more than Automation
The Myth of the Unmanned SOC By Amos Stern, CEO, Siemplify It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal […]
The Great Tech Transfer—A Success Story in Innovation
By John Shearer, Co-Founder, and CEO, DarkLight Solving business challenges often requires innovation, but fostering creativity and growing new technologies is a challenge in itself. Creating new services and products […]
Startups with Information Security in Mind at Startup
What’s this all about and does it really matter? By Kip There are some very talented people starting a company’s solving very complex problems that can save organizations millions of […]
Data Availability: Laying the Digital Foundation for a More Intelligent Business
Building strong digital foundations that focus on data availability will be vital to the future of every organization. They must implement effective intelligent data management strategies that help them be […]
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your […]
Genesee County Systems Pwned!
Systems Down By Charles Parker, II; Cybersecurity Lab Engineer There are vast numbers of municipalities of various sizes adjacent to each other throughout each state in the nation. Each of […]
Configuration Mistakes That Provide Field Days for Hackers
By Tim Bandos, Vice President of Cybersecurity at Digital Guardian Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or […]
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new […]
Effectively Using Email Authentication Standards for Stronger Message Integrity
By Jeff Stein, Information Security Architect, Reputation.com Once known as electronic mail and used for simple but near-instantaneous communication between computers, email has evolved to be used for a variety […]
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both […]
The Malware Research Insights
By Milica D. Djekic The malware by itself is any piece of malicious code that is capable to cause damage to the current IT configuration. The malicious applications could function […]
Slow Response Times to Blame for Phishing Attack Success on Organizations
By Atif Mushtaq, CEO, and founder, SlashNext Phishing poses a looming vulnerability for many enterprises today because the attackers have upped their game. They can now set up and take […]
The Storm after the Breach
How Consumers and Institutions Should Guard against Cybertheft By Archie Agarwal, CEO & founder, ThreatModeler Data breaches and cyberattacks have been hitting several of the highest-profile financial and media institutions […]
Hybrid Offenses as a Current Security Concern
By Milica D. Djekic When we say an offense we would mean any kind of criminality being a transnational crime, human trafficking or act of terrorism. In its essence, any […]
September Patch Tuesday
Updates are Light, But Ransomware Attacks Escalate By Chris Goettl, Director of Product Management, Security, Ivanti September marks the second month in a row with a relatively light set of […]