5 mistakes hindering effectiveness of SIEM solutions: Learning from real-life cases
With a SIEM solution installed, the security department can think it’s time to grab some popcorn and watch the system perfectly dealing with all possible threats impending their networks. Ah, […]
OPEN ACCESS APIs
WHAT NEEDS TO BE DONE TO MAKE THE PLATFORM MORE SECURE By David Midgley, Head of Operations, Total Processing I’m sure if you’re reading this, you already have a reasonable […]
SecurityScorecard – Risk Assessment Made Simple!
An interview with Susanne Gurman of SecurityScorecard, from Black Hat 2019 Las Vegas, NV – Amidst all the hustle and bustle of Black Hat 2019, I was privileged to have […]
The implementation of SOCs with the SMEs
By Milica D. Djekic The security operations centers (SOCs) are cybersecurity systems that are capable to provide security in a both – technological and organizational manner. Through this review, we […]
Best Practices for Remote and Branch Office Data Protection
By Gregg Petersen, Regional Director, Middle East, and SAARC, Veeam Software We’ve all heard about fantastic new data center technologies, but all too often it looks like these technologies only […]
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis […]
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as […]
Business Risk Intelligence: A Necessity Across the Enterprise
By Josh Lefkowitz, CEO at Flashpoint While the Deep & Dark Web has yielded important security considerations for some time, it’s really been in the last 18 months that the […]
2 Sure Ways To Prevent Cyber Crime
By Laban Moturi, Blogger and Writer. From writersbase.org writing company The World has come close and closer with the usage of the internet. With the growth of this, many evils […]
Security Orchestration is more than Automation
The Myth of the Unmanned SOC By Amos Stern, CEO, Siemplify It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal […]
A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
By David Barton, Chief Information Security Officer, Forcepoint At the height of merger-mania, eager participants frequently viewed cybersecurity as an afterthought. “Let’s just make this acquisition work,” they’d reason, “and […]
The reasons to catastrophical events within a critical infrastructure
By Milica D. Djekic Many would believe that the reasons for catastrophic events within any industrial infrastructure could be based on skillfully prepared hacker’s attacks. Basically, that’s the case with […]
The Great Tech Transfer—A Success Story in Innovation
By John Shearer, Co-Founder, and CEO, DarkLight Solving business challenges often requires innovation, but fostering creativity and growing new technologies is a challenge in itself. Creating new services and products […]
The Trials and Errors of Security Operations Revealed in New Report
By Roberto Sandoval, Manager, WW SIOC Strategic Solutions & Enablement, HPE Security The security industry is going through a volatile period. Threat actors are becoming bolder and evolving quickly, and […]
Six Reasons to Rethink Secure Remote Access
By Etay Bogner, VP, Zero-Trust Products, Proofpoint Whether you are the IT manager of a growing startup company or a midsize enterprise, you have probably already faced the increasing demand […]
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your […]
Genesee County Systems Pwned!
Systems Down By Charles Parker, II; Cybersecurity Lab Engineer There are vast numbers of municipalities of various sizes adjacent to each other throughout each state in the nation. Each of […]
The Myths You Shouldn’t Believe
By Sebastian Schaub, CEO, Hide.me There is a lot of information on the web regarding VPNs along with a wide and varied selection of VPN services to choose from. With […]
Still Misconfiguring Servers…
Addressing the Addressable By Charles Parker, II; Cybersecurity Lab Engineer When academics and students are writing papers, research is required. The research not only focused on the germane topic, however, […]
Effectively Using Email Authentication Standards for Stronger Message Integrity
By Jeff Stein, Information Security Architect, Reputation.com Once known as electronic mail and used for simple but near-instantaneous communication between computers, email has evolved to be used for a variety […]
Security in Orbit: Addressing the Current State of Satellite Security
By Geoff Pierce, Chief Information Security Officer, Centauri With 5G finally starting to roll out across the country, the anticipation for new IoT applications continues to build. With that anticipation […]
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both […]
Benefits of Conducting Crown Jewels Analysis
The main goal is to identify mission-critical cyber assets, but there are additional benefits… By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. Crown Jewels Analysis is a MITRE methodology […]
Crowdsourced Security and the Gig Economy
Alive and well in the worst way By Alex Haynes, CISO, CDL Let’s pretend you have offensive security skills and you want to use them for gainful employment. You attend […]
Cybersecurity and Compliance 1-2-3? Start With G-R-C
By John South, Senior Director of Global Threat Intelligence Development at NTT, Ltd. When an individual responsible for security, compliance and risk management in a corporation addresses these topics, the […]
The Need for a Better Protection of Small Businesses
By Milica D. Djekic The small businesses are the most common way of enterprises bringing over half of the GDP to any economy worldwide. From such a perspective, it’s quite […]
Going Beyond Compliance: What New Regulations Mean For Your Company
Cyber Defense Magazine By Zack Schuler, founder, and CEO of NINJIO How many times have you shared a piece of personal information online over the past year? If you’re adding […]
September Patch Tuesday
Updates are Light, But Ransomware Attacks Escalate By Chris Goettl, Director of Product Management, Security, Ivanti September marks the second month in a row with a relatively light set of […]
How Consumers Can Protect Their Identity after a Data Breach
Steps to safeguard personal information in a vulnerable cyber-space. By Paige Schaffer, CEO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit In an age where large retailers, […]
Employers Catch One-Year Break on Impending California Privacy Law
By Usama Kahf, Partner, Fisher Phillips Thanks to recent negotiations among state lawmakers, it appears that California employers may get a temporary reprieve on some of the more sweeping data […]