How Can You Tell If Your WordPress Site Has Been Hacked?
WordPress is the foundation of a large chunk of the web, which makes it an obvious target for criminals and hackers. If attackers find a vulnerability in WordPress, they have […]
Lock, stock and two smoking … access controls
By Milica D. Djekic The point of this article would not be to deal with some of London’s gangs, but rather to present what the access control is and why […]
Understanding Bluetooth and its role in the Internet of Things
By Dimitri Vlachos, VP of Marketing, Pwnie Express Bluetooth technology was originally designed for continuous, streaming data applications – essentially, it was intended to replace wires to create the possibility […]
Privacy and Security Issues in Autonomous Cars
By David Navetta, Boris Segalis, and Kris Kleiner, Norton Rose Fulbright US LLP As the development of self-driving car technology progresses, the prospect of privately-owned autonomous vehicles operating on public […]
The Evolving Landscape of Cybersecurity for SME’s
A brief digest from the SecureWorld New York 2019 New York, NY – With all the high-profile cyberattacks receiving coverage in the media as of late, cybersecurity is quickly becoming […]
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis […]
Are your critical systems lying to you? Protecting SCADA Systems from Data Forgery
By Michael Shalyt, VP Product Aperio Systems (www.aperio-systems.com) Like many things in life, the greatest cyber threat to critical infrastructure is in the things we cannot see. Both security analysts […]
Security Orchestration is more than Automation
The Myth of the Unmanned SOC By Amos Stern, CEO, Siemplify It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal […]
A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
By David Barton, Chief Information Security Officer, Forcepoint At the height of merger-mania, eager participants frequently viewed cybersecurity as an afterthought. “Let’s just make this acquisition work,” they’d reason, “and […]
The IoT Boom and The Implications on Our Home Networks
By Domenico Crapanzano, is CEO of Fing Over the past year you have probably seen ‘Internet of Things’ (IoT) popping up all over the place, but what does this vague […]
Software Forensics: Beyond the Law
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction Traditionally, the term “forensics” is the use of science to discover evidence of criminal activity. Extending this to software broadens the use […]
The reasons to catastrophical events within a critical infrastructure
By Milica D. Djekic Many would believe that the reasons for catastrophic events within any industrial infrastructure could be based on skillfully prepared hacker’s attacks. Basically, that’s the case with […]
The Great Tech Transfer—A Success Story in Innovation
By John Shearer, Co-Founder, and CEO, DarkLight Solving business challenges often requires innovation, but fostering creativity and growing new technologies is a challenge in itself. Creating new services and products […]
Startups with Information Security in Mind at Startup
What’s this all about and does it really matter? By Kip There are some very talented people starting a company’s solving very complex problems that can save organizations millions of […]
The Trials and Errors of Security Operations Revealed in New Report
By Roberto Sandoval, Manager, WW SIOC Strategic Solutions & Enablement, HPE Security The security industry is going through a volatile period. Threat actors are becoming bolder and evolving quickly, and […]
What Can You Do To Secure Your Data In The Cloud?
By François Amigorena, CEO and founder, IS Decisions Cloud storage brings so many benefits in terms of productivity and flexibility that it becomes almost impossible for organizations not to use […]
Data Availability: Laying the Digital Foundation for a More Intelligent Business
Building strong digital foundations that focus on data availability will be vital to the future of every organization. They must implement effective intelligent data management strategies that help them be […]
Six Reasons to Rethink Secure Remote Access
By Etay Bogner, VP, Zero-Trust Products, Proofpoint Whether you are the IT manager of a growing startup company or a midsize enterprise, you have probably already faced the increasing demand […]
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your […]
Even NASA Has Issues!
Listed Vulnerabilities Need to be addressed By Charles Parker, II; Cybersecurity Lab Engineer From a young age, we become acquainted with NASA through its missions to the Moon, Mars, Saturn, […]
Investing In SIEM: How Your Business Can Improve Threat Detection and Response
By Chester Avey, Cyber Security Specialist, Independent. Despite continual advancements in security technologies to protect businesses from cyber threats, there remains no silver bullet to completely prevent breaches. And that’s […]
Configuration Mistakes That Provide Field Days for Hackers
By Tim Bandos, Vice President of Cybersecurity at Digital Guardian Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or […]
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new […]
The Myths You Shouldn’t Believe
By Sebastian Schaub, CEO, Hide.me There is a lot of information on the web regarding VPNs along with a wide and varied selection of VPN services to choose from. With […]
Still Misconfiguring Servers…
Addressing the Addressable By Charles Parker, II; Cybersecurity Lab Engineer When academics and students are writing papers, research is required. The research not only focused on the germane topic, however, […]
New Research Shows Cyberattacks on SMBs Are Increasing Globally
A new survey from Keeper Security reports 66% of SMBs globally experienced a cyberattack within the past 12 months, 76% in the U.S For the third consecutive year, small and […]
Security in Orbit: Addressing the Current State of Satellite Security
By Geoff Pierce, Chief Information Security Officer, Centauri With 5G finally starting to roll out across the country, the anticipation for new IoT applications continues to build. With that anticipation […]
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both […]
Benefits of Conducting Crown Jewels Analysis
The main goal is to identify mission-critical cyber assets, but there are additional benefits… By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. Crown Jewels Analysis is a MITRE methodology […]
Crowdsourced Security and the Gig Economy
Alive and well in the worst way By Alex Haynes, CISO, CDL Let’s pretend you have offensive security skills and you want to use them for gainful employment. You attend […]