A Passwordless Future: Will Biometric Identification Replace Passwords?
By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It […]
Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of […]
Should We Be Worried About Vehicle Hacking?
And what can we do about it? By Martin Banks With more connected devices than ever, cybersecurity is a more prominent issue today than ever before. You’ll see articles and […]
How to Combat Cybersecurity Attacks & Cyber Warfare
By Adnan Olia, Chief Operating Officer and Co-owner of Intradyn It’s no secret that cybersecurity attacks and cyber warfares are real challenges and threats to the safety of individuals, businesses, […]
Security, Convenience & Privacy: A Neverending War
By Michael Covington, VP of Product Strategy, Wandera The veritable “Sophie’s Choice” among security decision-makers has increasingly become the three-way tug-of-war between security, convenience, and privacy. With the introduction of […]
Cyber Attacks at Sea: Blinding Warships.
Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the […]
Cyber Crimes Will Increase with Shift to Teleworking
By Andy Sauer, Director of Cybersecurity, Steel Root With the sudden shift to work-from-home operations, businesses are now forced to deal with increased activity from both independent and nation-state cybercriminals. […]
Cyber Operations Could Cause Traumatic Experiences
By Milica D. Djekic It’s quite risky spending your time in cyberspace. This environment could deal with so many traps, holes, and weird openings. In other words, it’s possible only […]
The Ransomware Age and How to Fight It
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption […]
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the […]
The Devil Inside
Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]
New Expectations for the Network Perimeter
Patchwork network of legacy solutions won’t keep bad actors out By Barrett Lyon, Co-founder, and CEO, Netography U.S. government agencies are placing increased importance on cross-network visibility for cloud and […]
Cleaning up “Dirty” Wi-Fi for Secure Work-from-Home Access
By Matias Katz, CEO, Byos A great deal of emphasis has been placed on the use of VPNs to help provide safe, secure connectivity during this historic COVID-19 crisis and […]
The Cost of Cybercrime Is Constantly Rising: How to Combat Ransomware Attacks on SMBs
By Rui Lopes, Sales Engineering and Technical Support Director, Panda Security Cybercrime is an undeniable constant in the business landscape these days. The cost of cybercrime is constantly rising—it is […]
Economic Efficiency in Cyber Defense
By Mark Evans, VP Marketing, Endace The previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series […]
Enabling Agility to Accelerate Incident Response
By John Attala, Vice President of Worldwide Sales, Endace In the first article in this series, Endace VP of product management Cary Wright discussed the importance of end-to-end network visibility […]
Your Passwords Have Already Been Hacked
Time to Remove the Ticking Time Bomb From Your IT Security Strategy By Shahrokh Shahidzadeh, CEO, Acceptto There was a time where dozens of stolen passwords or digital credentials would […]
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: […]
Secure Remote Active Directory Logins
By François Amigorena, CEO and founder, IS Decisions Organizations across the world have seen their way of working changed from face to face to remote working. This big change is […]
Debunking the Top Myths in Vulnerability Management for A Safer Enterprise
By Dr. Deepak Kumar, Founder, and CEO, Adaptiva Cybersecurity is one of the most daunting challenges enterprises will face in 2020. According to IBM’s 2019 Cost of a Data Breach Report, the […]
KPMG Recommends Steps to Bolster Cybersecurity in the COVID-19 Era
By Ton Diemont, Head of Cybersecurity at KPMG in Saudi Arabia Hackers are jumping on the COVID-19 pandemic to exploit global uncertainty Riyadh, 07 April 2020: The outbreak of Covid-19 […]
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just […]
Smart Buildings
Understanding the Security Risk By Andrea Carcano, Nozomi Networks Co-founder and CPO Smart Buildings: Understanding the Security Risks Today many of the world’s most forward-thinking workplaces are deploying smart technologies […]
Shadow Iot Devices A Major Concern for Corporate Networks
By Ashraf Sheet, Regional Director Middle East & Africa at Infoblox Infoblox Inc., the leader in Secure Cloud-Managed Network Services, today announced new research that exposes the significant threat posed […]
The Gap in Security – Data Centric Security
By Eric Rickard, CEO, Sertainty Federal Systems What do the Coronavirus pandemic, 9/11 terrorist attacks, Boeing 737 MAX crashes, and the OPM data breach have in common? First, their root […]
VPNs – 2020 And Beyond
By Sebastian Schaub, Founder and CEO, hide.me In the last 5 years, awareness to protect data, to encrypt communication, and minimize data collection has rapidly increased. Privacy and trust will […]
Analysing Data Using the Intelligence Cycle: An Overview
By Alan Blaney, Managing Director of Focus Training When it comes to analyzing different forms of intelligence, using a detailed and coherent process is crucial in order to determine the […]
Juggling Your Clouds
Managing the Federal Government’s Multi-Cloud Future By Cameron Chehreh, Chief Technology Officer, Dell Technologies Federal Driven by the recent Cloud Smart initiative, federal agencies are prioritizing cloud and on track […]
The Secret to Winning IT Security Roulette
By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino where the longer you stay, the more likely […]
RSA Conference 2020 – What’s Keeping Cybersecurity Experts Up At Night?
San Francisco, CA – At the RSA Conference 2020, Gary Berman and I had the privilege of interviewing some of the top executives in the cybersecurity Community about what concerns […]