Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a runtime solution that is proactive, effective, and frictionless. Oligo found […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Directed Analytics – The Future of Data Management

By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Directed Analytics – The Future of Data Management

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

Modern Times, Old Prejudices

The Hacker Era By Jordan Marcus Bonagura The century of constant acceleration Twenty-first century, more than a century of human evolution and great changes, a century of constant acceleration. Everything […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Modern Times, Old Prejudices

The Importance of Multi-Factor Authentication and Strong Passwords

Understanding and implementing MFA and strong password protocol. By Jeff Severino, CyberLock Defense, Lockton Affinity The importance of multi-factor authentication and password security is critical. Often, it is your best […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on The Importance of Multi-Factor Authentication and Strong Passwords

The Future of Cybersecurity? Just One Word: Automation

By Dr. Peter Stephenson If you are not better informed, smarter, better equipped, and faster than the adversary, you can count on your system being compromised at some point. When […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on The Future of Cybersecurity? Just One Word: Automation

Trust Not in Third-Parties

You aren’t on your own in cybersecurity, but you should act like you are By Gregory Hoffer, CEO, Coviant Software Cybersecurity management is a dynamic process. There is no “set […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Trust Not in Third-Parties

Maximizing the Impact of AI/ML Threat Detection Tools

By Cary Wright, VP Product Management, Endace Companies are increasingly looking to Artificial Intelligence (AI) and Machine Learning (ML) threat detection tools to improve the security posture of the enterprise. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Maximizing the Impact of AI/ML Threat Detection Tools

REvil ransomware gang demands $70M for universal decryptor for Kaseya victims

REvil ransomware is demanding $70 million for decrypting all systems locked during the Kaseya supply-chain ransomware attack. REvil ransomware is asking $70 million worth of Bitcoin for decrypting all systems […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on REvil ransomware gang demands $70M for universal decryptor for Kaseya victims

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X