Emotet Attacks Surge in 2020, but Could Be Prevented
By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]
How COVID Tests the Resilience of Your Cloud Data Infrastructure
By Noah Johnson, Co-founder & CTO, Dasera In recent years, we’ve seen a massive shift as companies eliminate the physical restraints of IT infrastructure and its users by moving to […]
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people […]
In the Midst of the Pandemic, Cybersecurity Professionals Show an Uptick in Job, Salary Satisfaction Despite High Stress Levels
By Samantha Humphries, security strategist, Exabeam Interested in a career in cybersecurity — or are you wondering what your peers in the space are thinking? Exabeam’s 2020 Cybersecurity Professionals Salary, […]
Why Endpoint Protection Should Be a Security Priority
Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]
Measuring Cybersecurity Systems Durability
By Joseph Kirkpatrick, President, Kirkpatrick Price Developing sound cybersecurity systems is a complex, multi-faceted task– but a crucial one. Not only do these systems help businesses meet their regulatory requirements, […]
Cyber-Attacks Are the New Norm and Ransomware Is on The Rise
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G, […]
Centrify Study Lifts the Hood on Cybersecurity Policy and Threat Challenges During COVID-19
Recent study shows increased breaches in cybersecurity led nearly 40% of UK business decision makers to dismiss staff members since the start of the pandemic By Andy Heather, VP and […]
Election Integrity Is A Moving Target, But It’s Essential to Pursue
Measures to improve voting security need to start long before election day itself By Craig Hinkley, Chief Executive Officer, WhiteHat Security, a wholly-owned, independent subsidiary of NTT Ltd. U.S. […]
Cyber Liability Insurance – Safe Bet or Sales Gimmick?
By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we see more stories about companies overtaken by this type of cyberattack. Garmin and Canon, […]
Do Not Forget to Securely Lock Your Data in Microsoft Teams
By Johanna Reisacher, Marketing Manager, Secomba GmbH More and more employees work from home. As a result, in the last months the demand for Microsoft products, especially Microsoft Teams, has […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Securing the Weakest Links in Today’s Public Cloud Environments
By Avi Shua, CEO, Orca Security The demand for cloud security is continuing to explode, with short-term needs being accelerated by the shift to remote work during the pandemic. According […]
Protecting a Mobile Workforce with Hybrid DNS Security
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox The future of the workplace is undoubtedly a remote workforce, accessing the corporate network via mobile devices and the […]
Cyber Literacy in Post-Digital Era as Part of National Security
By Aliaksei Hapeyeu, master’s degree student from Shandong University Cyberspace in the post-digital era has become not only a tool, but also a domain where people live, work, and relax. […]
What Is Being Done, And How Can They Improve?
By Martin Banks People have worried about the safety of nuclear energy since it first came around in the mid-twentieth century. Nuclear energy has a lot of potential for powering […]
Are the Worst Cryptocurrency Security Breaches Behind Us?
By Tim Fries, Co-Founder, The Tokenist You would be right in assuming that blockchain itself was never hacked, but that doesn’t mean people don’t like to give up security features […]
Looks Like Russian Hackers Are on An Email Scam Spree
By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]
Why Are Fully Staffed Cybersecurity Teams Unable to Keep Up with Hacks?
By Steve Salinas, Head of Product Marketing, Deep Instinct Faced with mounting cyber threats, large enterprises are devoting more resources than ever to improving their cybersecurity posture. According to a […]
Network Security Is Not Data Security
Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks […]
The Future of Security – Predictions Post COVID-19
By Mike Riemer, Pulse Secure, Global Chief Security Architect The Future of Work post COVID-19 – Larger Remote Workforce with Cybersecurity Built into the Culture “A recent Gartner survey of […]
How to Combat Cybersecurity Attacks & Cyber Warfare
By Adnan Olia, Chief Operating Officer and Co-owner of Intradyn It’s no secret that cybersecurity attacks and cyber warfares are real challenges and threats to the safety of individuals, businesses, […]
Is Proactive Insider Risk Mitigation Possible?
Why Companies Need More Than Technical Indicators to Identify Their Biggest Threats Before They Do Harm By David A. Sanders, Director of Insider Threat Operations, Haystax Most corporate insider threat […]
Don’t Be Breached When Using Commercial Software Products
By Randy Reiter CEO of Don’t Be Breached In May 2020 the software giant SAP made available eighteen security fixes for its Adaptive Server Enterprise (ASE) database system (formerly Sybase […]
7 Security Precautions to Protect Remote Workers
By Marty Puranik, President & CEO, Atlantic.Net The COVID-19 pandemic has engulfed the world’s population, crippled global economies, and changed the way of life for almost every single person in […]
Security, Convenience & Privacy: A Neverending War
By Michael Covington, VP of Product Strategy, Wandera The veritable “Sophie’s Choice” among security decision-makers has increasingly become the three-way tug-of-war between security, convenience, and privacy. With the introduction of […]
Cyber-Secure Access Control Solutions for Workplaces
By Imran Anwar FBI has reported a 400% increase in cybercrime reports during the COVID-19 pandemic. Cybersecurity has become a big challenge for business owners while they try to keep […]
Ensuring Cybersecurity in A Remote Workplace
How to Make Sure your Remote Team is Secure By Ryan Ayers, Freelance Writer & Tech Consultant With e-commerce at an all-time high in the wake of the COVID-19 lockdown, […]
Achieving Effective User Lifecycle Management Through Automation
By Jeff Stein, Information Security Architect, Reputation.com When considering the security of an enterprise, a key area ripe for automation should be user lifecycle management. The topic is important not […]
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn […]