3 Educational Cyber Security Steps for The Protection of Your Personal Data
By Ankit Rajpurohit Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen […]
Changing Cybersecurity Culture One Habit at A Time
By George Finney, Chief Security Officer for Southern Methodist University and Author of Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future My first job out of college […]
How to Avoid or Remove Mac Malware
Today, Macs are more prone to hacking attacks than PCs. In this article, you’ll find useful tips on how to detect malware on your computer and get rid of it. […]
Reducing ‘Cyber-security Engineer Burnout’
A first-hand experience of the workload challenges security engineers face, and how their employers can help to address them By Tim Bloomer, a Sales Engineer at AlgoSec I’m sure we’ve […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
5 Steps to Ensure Iot Security Amidst CMMC Compliance
By Mike Raymond, Federal Sales Manager, Ordr Cyber threats against the U.S. and the Department of Defense (DoD) are very real, and efforts related to the department’s Cybersecurity Maturity Model […]
3 Steps to Reimagine Your AppSec Program
By Jake Reynolds, Product Manager at NetSPI and Nabil Hannan, Managing Director at NetSPI With Continuous Integration/Continuous Deployment (CI/CD) increasingly becoming the backbone of the modern DevOps environment, it’s more […]
Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions
Provide Users Fast and Secure Connectivity from Anywhere with the Leading SASE Platform Based on Containerization for Complete Data Isolation With increasing bandwidth, encrypted traffic, shifts to cloud applications like […]
Years of Iot Hacking, But What Have We Actually Learned?
By Brad Ree, CTO, ioXt Alliance Since the inception of the Internet of Things (IoT) in 1999, connected devices have been integrated into nearly every industry, from retail to automotive […]
One Year on From Whatsapp Hack- What’s Changed?
In 2019, WhatsApp was hacked using sophisticated NSO spyware, Pegasus, used to spy on iOS WhatsApp users’ phones. By Nicole Allen, Marketing Executive, SaltDNA One year on from WhatsApp Hack […]
Cyber-Attacks Are the New Norm and Ransomware Is on The Rise
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G, […]
Business Email Compromise – Why Is It Dangerous and How to Avoid It
By Elena Georgescu, Communication & PR Officer at Heimdal™ Security When talking about business email compromise, we cannot omit to mention two aspects: technology and money. Technology is the engine […]
COVID Impact on MSSPs
By Tristan Hinsley, Cybersecurity Expert, TDI Security Given the remote nature of most Managed Security Service Providers’ (MSSPs) business operations, most would imagine they would be well-positioned to deal with […]
Automotive Cybersecurity Is Not One-Size-Fits-All. Here’s How Oems And Tier 1s Can Tailor Their Approach to Meet the Needs of The Market
OEMs, Tier 1s, and key supply chain players all differ in their approach to cybersecurity, opting for strategies that align specifically with their needs. Chief Product and Marketing Officer Nathaniel […]
Weaknesses of Biometric Authentication
By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever. The democratization of digital […]
Media Content Captured on Mobile Is Driving Compliance Problems
Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, Inkscreen Recent headlines are once again demonstrating the consequences of employees’ […]
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes […]
Protecting a Mobile Workforce with Hybrid DNS Security
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox The future of the workplace is undoubtedly a remote workforce, accessing the corporate network via mobile devices and the […]
New Research Highlights Importance of HTTPS Inspection to Detect Encrypted Malware
Two-thirds of malware in Q1 2020 was delivered via HTTPS traffic, Monero cryptominers are on the rise and more By Marc Laliberte, Senior Security Analyst at WatchGuard Technologies Today’s threat […]
Cyber Literacy in Post-Digital Era as Part of National Security
By Aliaksei Hapeyeu, master’s degree student from Shandong University Cyberspace in the post-digital era has become not only a tool, but also a domain where people live, work, and relax. […]
HIPAA Compliance and The Protection of Cyber Security
By Andrew Mikhailov, CTO at Zfort Group Businesses face the risk of severe cyber-attacks – the present-day cyberspace criminals are well-organized, thoughtful, and marketable. And one of the most sensitive […]
Getting Employees Back to the New Normal
Work will never be quite the same once the pandemic has passed By Brendan O’Connor, CEO, and Co-founder, AppOmni There are encouraging signs that the Covid-19 pandemic – arguably the […]
Can We Better Leverage Our – Already Scarce – Cyber Security Human Resources?
By Douglas Ferguson, Founder & CTO, Pharos Security It is accepted that there is a significant cybersecurity skills deficit. The result, it is argued, is that cybersecurity teams do not […]
Cyber Warfare and its impact on businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments, and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
Network Security Is Not Data Security
Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks […]
Cyber Security Market to Reach USD 400 Billion by 2026
The cybersecurity market will be driven by rising demand for cyber protection as well as advanced network infrastructure security across enterprises. By Saloni Walimbe, Content Writer at Global Market Insights, […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
Post COVID-19 Cybersecurity and Future-of-Work Predictions
By Chris DeRamus, VP of Technology, Cloud Security Practice Remote work is here to stay: “Some organizations (including DivvyCloud) preferred coming into the office for work prior to the pandemic […]
Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud
By Robert Prigge, CEO of Jumio Passwords will become extinct much faster than predicted. As the COVID-19 pandemic pushed more of us to self-isolate, Zoom became the go-to teleconferencing platform. […]
Post COVID-19: Cloud, Remote Work and BYOD Security Predictions
By Anurag Kahol, CTO and co-founder, Bitglass Cloud adoption has already been growing rapidly, but we’ll see a sharp increase in adoption in 2020 as a result of the global […]