It’s Time for A Tough Conversation About Trust
By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks,…
The Growing Costs of Cyber Attacks on UK Small Businesses
By Dan Baker, Content Writer, SecureTeam The amount of cyber attacks in the UK and across the world continues to grow each year and small businesses are increasingly the targets…
Automatic for The SOC People
How Automation Can Quell Those Pesky False Positives By Steve Salinas, Director of Product Marketing, Siemplify As a newly hired cybersecurity analyst, you’re excited to start vanquishing threats and thwarting…
The Email Security Challenges
By Milica D. Djekic Let’s try to remember the times of the old, good letters when the postman was knocking at your door or apparently leaving the message in your…
The Internet Got Safer In 2019: A Cybersecurity Year in Review
By Daniel Kanchev, Chief Enterprise Architect, SiteGround It’s just a fact: In 2019 the Internet got safer by default. SSL encryption adoption is now at an all-time peak, with the…
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once…
Adobe Offers CCF – an Open Source InfoSec Standard
The Common Control Framework (CCF) by Adobe is the cornerstone of our company-wide compliance strategy. It is a comprehensive set of simple control requirements, rationalized from the alphabet soup of…
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities and local governments in Texas were hit by a coordinated ransomware attack. The hackers…
6 Benefits of Using MFT for Encrypted File Transfers
A managed file transfer (MFT) solution is a product that successfully handles all aspects of inbound and outbound file transfers while utilizing industry-standard network protocols and encryption. It can automate…
TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that. How did they accomplish this esteemed…
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of…
Applying Security Across Heterogeneous IT Systems
Proactive Threat Interference® provides protection not offered by other cybersecurity approaches By Steve Ryan, CEO & Co-Founder, Trinity Cyber, Inc. Do I patch my system in the name of security,…