A Passwordless Future: Will Biometric Identification Replace Passwords?

By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on A Passwordless Future: Will Biometric Identification Replace Passwords?

Everything You Want to Know About Single Sign-On

By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Everything You Want to Know About Single Sign-On

Should We Be Worried About Vehicle Hacking?

And what can we do about it? By Martin Banks With more connected devices than ever, cybersecurity is a more prominent issue today than ever before. You’ll see articles and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Should We Be Worried About Vehicle Hacking?

Cyber Attacks at Sea: Blinding Warships.

Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cyber Attacks at Sea: Blinding Warships.

Cyber Operations Could Cause Traumatic Experiences

By Milica D. Djekic It’s quite risky spending your time in cyberspace. This environment could deal with so many traps, holes, and weird openings. In other words, it’s possible only […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Cyber Operations Could Cause Traumatic Experiences

The Ransomware Age and How to Fight It

By Pedro Tavares,  Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on The Ransomware Age and How to Fight It

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

The Devil Inside

Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on The Devil Inside

New Expectations for the Network Perimeter

Patchwork network of legacy solutions won’t keep bad actors out By Barrett Lyon, Co-founder, and CEO, Netography U.S. government agencies are placing increased importance on cross-network visibility for cloud and […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on New Expectations for the Network Perimeter

RSA Conference 2020 – What’s Keeping Cybersecurity Experts Up At Night?

San Francisco, CA – At the RSA Conference 2020, Gary Berman and I  had the privilege of interviewing some of the top executives in the cybersecurity Community about what concerns […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on RSA Conference 2020 – What’s Keeping Cybersecurity Experts Up At Night?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X