Executive Protection Needs to Include Digital

By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks and dangers inherent to their executives’ security. Executive Protection is an established […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Executive Protection Needs to Include Digital

City of Tulsa, is the last US city hit by ransomware attack

The city of Tulsa, Oklahoma, has been hit by a ransomware attack over the weekend that impacted its government’s network and shut down its websites. One of the biggest cities […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on City of Tulsa, is the last US city hit by ransomware attack

Gap of The Red Team from The Leak of Fireeye

Use “Imaginary Enemy” methodology to mitigate APT Attack By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone Introduction Early in the morning, I was pulled up by the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Gap of The Red Team from The Leak of Fireeye

Malware Evasion Techniques

By Stas Gaivoronskii, Malware Analyst at ANY.RUN Cybercriminals create new ways to make malware invisible for detection. They hide malicious indicators and behavior during analysis. Researchers need to know about […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Malware Evasion Techniques

Cyberattacks could pose a material risk to water and sewer utilities

Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to repay debt. Fitch Ratings Inc. is an American credit rating […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Cyberattacks could pose a material risk to water and sewer utilities

Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

More Power, More Responsibility

What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on More Power, More Responsibility

Growth Strategies for China Must Prioritize WeChat Security

By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber China accounts for almost a quarter of global GDP, and its growing middle class has significant spending power. Across every industry, […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Growth Strategies for China Must Prioritize WeChat Security

Rise of BYOD Once Again

By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Rise of BYOD Once Again

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , | Comments Off on SOCs to Turn to Security Automation to Cope with Growing Threats

CISA is warning of vulnerabilities in GE Power Management Devices

U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that could allow an attacker to conduct multiple malicious activities on vulnerable systems. U.S. Cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CISA is warning of vulnerabilities in GE Power Management Devices

How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

Moving to Active Defense: What It Means, How It Works and What You Can Do Now

By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Moving to Active Defense: What It Means, How It Works and What You Can Do Now

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X