Enterprises Demand MSSPs Offering MDR Services Through Cybersecurity Convergence
By Arun Gandhi, Director of Product Management of the Seceon Enterprises from all verticals are embracing digital transformation. This new, increasingly connected digital world is bringing tremendous efficiencies to the […]
Securing the Next Generation Data Center
By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks Securing Cloud-Generation Data Centers As many firms transition their data centers into the […]
Moving Network Security to The Cloud
What is secure access service edge (sase) and why it matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only […]
COVID-19: Disaster Preparedness for the Digital-First Business
By Otavio Freire, President, CTO and Co-Founder SafeGuard Cyber COVID-19, also known as coronavirus, is proving to be a stubborn pathogen. Tragically, the global death toll has now surpassed 3,000. […]
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
Not All Hackers Are Criminals, And Some of The Good Guys Can Earn A Million Dollars
Dr. Roberto Di Pietro, a full professor of cybersecurity at Hamad Bin Khalifa University’s College of Science and Engineering, explains why there is a misconception about the term ‘hackers’. The […]
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal […]
The Growing Importance of API Security
APIs are everywhere, and they are ripe targets for malicious attacks By Ameya Talwalker, Co-founder and CPO, Cequence Security Earlier this year I wrote a blog about key trends in […]
Industrial Control System Vulnerabilities: A Prime Target of Our Critical Infrastructure by Adversaries
By Dr. Daniel Osafo Harrison, DCS, C|CISO, CISM, CISA, CRISC, Security+ Industrial control system (ICS) is a dynamic technological system with subsystems such as programmable logic controllers (PLCs), Remote Terminal […]
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly […]
Accelerating the Pace of Government IT Modernization
By Jeff Elliott For decades, the federal government has been hamstrung in its efforts to adopt new IT systems by the glacial pace of RMF accreditation and the manual processes […]
5 Key Steps to Secure IOT Product Development
By Kateryna Boiko, Marketing Manager, Mobilunity A new concept that has taken the world by storm is the so-called “Internet of Things” (IoT). IoT refers to systems designed to transfer […]
Data Privacy in A Device-Driven World: Navigating the Impact Of California’s 2020 IOT Security Legislation
A call for consumer education on-device security vulnerabilities in light of the increasing push for IoT security regulation By Brian Murray Throughout the past few decades, the Internet of Things […]
DivvyCloud 2020 Predictions
By Chris DeRamus, CTO and co-founder, DivvyCloud Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, […]
Balbix 2020 Predictions
By Gaurav Banga, CEO, and founder, Balbix In light of the ever-growing cybersecurity skills gap, and an exploding attack surface, infosec leaders will shift their focus from increasing headcount to […]
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view […]
8 Common Types of Small Business Cyber Attacks
By Jonathan Krause, Owner, Forensic Control Whilst large scale cyber-attacks are well documented, there is also an increasing number of e-commerce small businesses at threat from targeted attacks. A report […]
Really, Imagine a Day Without Water
By Michael Yehoshua On October 23, toothpaste maker Colgate and world champion swimmer, Michael Phelps, the ambassador for the company’s Save Water initiative, headed over 1,100 organizations across the United […]
Maze Ransomware operators threaten victims to publish their data online
The victims of the Maze Ransomware now face another threat because operators behind the malware could become publish their data online. The victims of the Maze Ransomware are facing another […]
The Only Recession in Cybersecurity
Sleep-deprived, overworked and fatigued security professionals impose huge risks to an organization By Karl Sharman, Vice-President, BeecherMadden Tired, overworked and fatigued employees pose huge risks to organizations. It’s obvious to […]
The Rise of Cybercrime-As-A-Service
And What It Means for Businesses By Mark Belgrove, Head of Cyber Consultancy, Exponential-e In a sea of increasingly complex cyber warfare and nation-state hackers, it can be easy to […]
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity […]
How Cybersecurity Became a Major Issue for Your Business’ SEO
By Chester Cybersecurity is no longer a niche issue that you can afford to ignore. Every year, half of all businesses report being hacked, and this can cause huge problems […]
How to Address the Top 5 Human Threats to Your Data
By Dave Sikora The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to protect. For most businesses today, that most valuable asset […]
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that […]
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from […]
The Intersection of Artificial Intelligence and Cybersecurity
By John Harrison, Director, Cybersecurity Center of Excellence, Criterion Systems It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years, and while it […]