Cyber Warfare and its impact on businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments, and the public have all witnessed unprecedented growth in the digital economy. From the design of […]
How To Grow Your Cyber Expertise During A Pandemic
By Bradley Hayes, Chief Technology Officer at Circadence IT pros can still learn new skills despite perceived barriers to progressing professionally during the pandemic. While working circumstances and environmental factors […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
The Future of Security – Predictions Post COVID-19
By Mike Riemer, Pulse Secure, Global Chief Security Architect The Future of Work post COVID-19 – Larger Remote Workforce with Cybersecurity Built into the Culture “A recent Gartner survey of […]
Post COVID-19: Cloud, Remote Work and BYOD Security Predictions
By Anurag Kahol, CTO and co-founder, Bitglass Cloud adoption has already been growing rapidly, but we’ll see a sharp increase in adoption in 2020 as a result of the global […]
Managing Small Business Cybersecurity During Covid-19
By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote […]
Benefits of A Security Operation Center (SOC)
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt The creation of a Security Operations Center (SOC) has increasingly stood out as something necessary to help companies defend themselves against damage caused by cyber-attacks. […]
Organizations: It’s Time to Rethink How You Protect Environments from Within
By Richard Melick, senior technical product manager, Automox Many of us have made the shift to virtual with our work, school, and social lives, as we all aim to protect […]
The Race to Pivot Around Remote Work and The Emergence Of SASE
By Amit Bareket, CEO and Co-Founder of Perimeter 81 When Kodak completely neglected the rise of digital photography (an idea that Kodak itself invented) and then continued to willfully drive […]
7 Security Precautions to Protect Remote Workers
By Marty Puranik, President & CEO, Atlantic.Net The COVID-19 pandemic has engulfed the world’s population, crippled global economies, and changed the way of life for almost every single person in […]
3 Practices to Avoid Security Risk in A Work from Home World
By Akshay Bhargava, Chief Product Officer, Malwarebytes Well before COVID-19 hastened people working from home, users embraced “bring your own device” (BYOD) practices. It created a proliferation of work-connected personal […]
Security, Convenience & Privacy: A Neverending War
By Michael Covington, VP of Product Strategy, Wandera The veritable “Sophie’s Choice” among security decision-makers has increasingly become the three-way tug-of-war between security, convenience, and privacy. With the introduction of […]
Cyber Operations Could Cause Traumatic Experiences
By Milica D. Djekic It’s quite risky spending your time in cyberspace. This environment could deal with so many traps, holes, and weird openings. In other words, it’s possible only […]
Security in A Multi-Cloud Environment
By Paul Nicholson, Sr. Director of Product Marketing, A10 Networks As companies leverage a multi-cloud strategy to improve IT operations and provide better services to their customers, they can’t afford […]
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and Route These “Below the Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]
Ensuring Cybersecurity in A Remote Workplace
How to Make Sure your Remote Team is Secure By Ryan Ayers, Freelance Writer & Tech Consultant With e-commerce at an all-time high in the wake of the COVID-19 lockdown, […]
A Cyber Approach to Coronavirus Containment
By Zohar Rozenberg What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign? In recent years, some in the cyber world recognize […]
The Cost of Cybercrime Is Constantly Rising: How to Combat Ransomware Attacks on SMBs
By Rui Lopes, Sales Engineering and Technical Support Director, Panda Security Cybercrime is an undeniable constant in the business landscape these days. The cost of cybercrime is constantly rising—it is […]
Credential Stuffing: Why It’s on The Rise and How to Decrease Your Risk
By Kevin Landt, VP of Product Management at Cygilant Reports of high-profile data breaches like Equifax’s, LinkedIn’s, or Yahoo’s always caused an initial, widespread panic — and for good reason. But […]
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn […]
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success […]
Your Passwords Have Already Been Hacked
Time to Remove the Ticking Time Bomb From Your IT Security Strategy By Shahrokh Shahidzadeh, CEO, Acceptto There was a time where dozens of stolen passwords or digital credentials would […]
Best Practices for Better SOC Analysis
By Chris Calvert, co-founder, Respond Software Security analysts are a breed apart. They work long hours, using their intelligence and attention to detail to sort false alarms from real threats. […]
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to […]
Not All Secure Certificates Created Equal
By Cal Evans, Developer and SiteGround Ambassador Data security is essential for every person who uses the Internet, but if you have your own site, the stakes are even higher. […]
The Cyber Challenges of the 21st Century
By Emil M.Hasanov The National Cyber Strategy demonstrates my commitment to strengthening America’s cybersecurity capabilities and securing America from cyber threats. It is a call to action for all Americans […]
The Hard Drive Secondary Market: The Sorry State of The Industry
Why NextUse Hard Drive Quality Surpasses the Competition By James Mannering, Hard Drive Product Manager at NextUse Remarketing, the reselling of end-of-life or retired IT assets like hard drives, is […]