What Can You Do To Secure Your Data In The Cloud?
By François Amigorena, CEO and founder, IS Decisions Cloud storage brings so many benefits in terms of productivity and flexibility that it becomes almost impossible for organizations not to use […]
Six Reasons to Rethink Secure Remote Access
By Etay Bogner, VP, Zero-Trust Products, Proofpoint Whether you are the IT manager of a growing startup company or a midsize enterprise, you have probably already faced the increasing demand […]
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your […]
High Schools Are Not Exempt From Attack
San Diego USD By Charles Parker, II; Cybersecurity Lab Engineer High schools are much like universities and colleges, in that these hold a mass amount of data which may easily […]
Configuration Mistakes That Provide Field Days for Hackers
By Tim Bandos, Vice President of Cybersecurity at Digital Guardian Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or […]
The Myths You Shouldn’t Believe
By Sebastian Schaub, CEO, Hide.me There is a lot of information on the web regarding VPNs along with a wide and varied selection of VPN services to choose from. With […]
Effectively Using Email Authentication Standards for Stronger Message Integrity
By Jeff Stein, Information Security Architect, Reputation.com Once known as electronic mail and used for simple but near-instantaneous communication between computers, email has evolved to be used for a variety […]
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both […]
The Need for a Better Protection of Small Businesses
By Milica D. Djekic The small businesses are the most common way of enterprises bringing over half of the GDP to any economy worldwide. From such a perspective, it’s quite […]
Speculative Execution and SWAPGS
A Match Made In Heaven for Motivated Threat Actors By Filip Truta, Information Security Analyst, Bitdefender What if cybercriminals could deploy an attack that is both devastating and impossible to […]
The security’s challenges of an Internet of Things
By Milica D. Djekic The Internet of Things (IoT) is not that new concept beginning with these days. It’s more like the name of the current state being correlated with […]
Cyber Security and the Supply Chain: Strengthening the Weak Links
By Simon Taylor, VP Product at Glasswall Solutions In today’s cybersecurity climate, with high-profile hacks and data breaches constantly in the headlines, businesses are putting more effort than ever into […]
Tips to Help Boost the Security of Your MySQL Database
By Sujain Thomas, Security of Your MySQL Database, Remote DBA If you have been keen on database security news, you may have heard of the attacks on MySQL databases. The […]
The Myth Behind Frequent Password Changes
Are they good practice or counterproductive? By Sarosh Petkar, BS/MS Student, Computing Security – RIT INTRODUCTION Mandatory password changes are an age-old security practice within numerous organizations. This practice is […]
Ransomware and the Internet of Things
By David Balaban IoT ransomware is more dangerous than traditional ransomware Ransomware has become one of the most serious cyber threats these years. Today, all of us – from home […]
Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
By Anas Baig If the recent anti-privacy bill’s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their […]
The Human in the Middle
Behavioral Design for Cybersecurity By Alex Blau, Vice President, ideas42 In this ever-maturing digital era, using technology to solve our everyday problems feels like an obvious thing to do. Yet, […]
Look into my Crystal Ball; let’s see what 2020 has in store
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. The Christmas hangovers are starting to clear, every advert on TV seems to tell me that I need to begin the 2020diet […]
The challenges of an Internet of Things analytics
By Milica D. Djekic Through a history – we would notice the importance of good analytics in many areas of human activities. For instance, many military strategists would deal with […]
Addressing the government data security problem
By Marcelo Delima, Global Product Marketing Manager at HPE Security – Data Security Throughout federal, state, and local governments, the digital revolution is driving exponential growth of high-value data. Personally […]
10 cyber security measures growing companies should implement
Tips to keep your business safe as it expands By Asher de Metz, Lead Senior Consultant (Information Security), Sungard Availability Services (Sungard AS) This may surprise you, but growing companies […]
Best Practices to keep your Home WiFi Secured
by Lisa Barrie, Sub-editor at List Enthusiast Wi-Fi internet or traditional wired internet? Ask any person and he/she’ll go for the former. The ease-of-use, easier installation, and maintenance mean Wi-Fi […]
Multi-factor Authentication Implementation Options
“2FA to 5FA – What are the options available?” By David Smith Independent Consultant at Smart Card Institute At some point of time, we have all used an OTP (One-time […]
How Real-Time Asset Intelligence Enables Full Posture Control
By Ellen Sundra, VP of Americas Systems Engineering, Forescout Technologies The massive growth of devices hitting our networks is not a secret or a new discussion. We have all seen […]
The Dangers of the Integrated Home/Workplace
Personal data breaches are one of the fastest-growing cybercrimes in the US. As IoT devices become increasingly common at home and in the workplace, measures must be taken to secure […]
Server less Security Analysis: The Best Practices on How to Enforce Them
By Aaron Chichioco, content editorial manager/web designer, Design Doxa Even before companies started making the jump to go serverless, security has already been a concern in a world largely becoming […]
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to […]
Ready Position – Proactive Teams are Helping Solve the Cyber security Skills Shortage
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Some of the fans glancing toward the outfield at a baseball game may be recalling their own Little League days. […]
Public Sector Beware: 3 Steps to a Better Cyber attack Prevention Strategy
By Phil Richards, CISO, Ivanti Just as healthcare organizations were a popular target of ransomware attacks over the past two years, public sector organizations (including school districts, municipalities and local […]
Data Risk Report Shows Lack of Security across Industries
87% of companies lack data security By Rob Sobers, software engineer, Varonis When it comes to cybersecurity, one of the top concerns is the risk and vulnerability of sensitive data. […]