How To Grow Your Cyber Expertise During A Pandemic

By Bradley Hayes, Chief Technology Officer at Circadence IT pros can still learn new skills despite perceived barriers to progressing professionally during the pandemic. While working circumstances and environmental factors […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on How To Grow Your Cyber Expertise During A Pandemic

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

The Future of Security – Predictions Post COVID-19

By Mike Riemer, Pulse Secure, Global Chief Security Architect The Future of Work post COVID-19 – Larger Remote Workforce with Cybersecurity Built into the Culture “A recent Gartner survey of […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on The Future of Security – Predictions Post COVID-19

IOT Security Embedded in Memory Cards

AS DEVICES, MACHINERY AND MANUFACTURING PLANTS GET SMARTER, THEY ALSO BECOME MORE VULNERABLE. By Hubertus Grobbel, Vice President Security Solutions, Swissbit. When designing networked devices, machinery, and production facilities, developers […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on IOT Security Embedded in Memory Cards

Managing Small Business Cybersecurity During Covid-19

By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Managing Small Business Cybersecurity During Covid-19

The Race to Pivot Around Remote Work and The Emergence Of SASE

By Amit Bareket, CEO and Co-Founder of Perimeter 81 When Kodak completely neglected the rise of digital photography (an idea that Kodak itself invented) and then continued to willfully drive […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Race to Pivot Around Remote Work and The Emergence Of SASE

Cyber Operations Could Cause Traumatic Experiences

By Milica D. Djekic It’s quite risky spending your time in cyberspace. This environment could deal with so many traps, holes, and weird openings. In other words, it’s possible only […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Cyber Operations Could Cause Traumatic Experiences

Ensuring Cybersecurity in A Remote Workplace

How to Make Sure your Remote Team is Secure By Ryan Ayers, Freelance Writer & Tech Consultant With e-commerce at an all-time high in the wake of the COVID-19 lockdown, […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Ensuring Cybersecurity in A Remote Workplace

Thanks For Being Part Of The Journey to $100 Million in Bounties!

By Jobert Abma and Michiel Prins, Co-Founders at HackerOne Reaching $100 Million in lifetime bounties paid ($100 Million!) reminded us of how much we appreciate everyone who has decided to […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Thanks For Being Part Of The Journey to $100 Million in Bounties!

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X