Cybersecurity: Innovation Needed

Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Cybersecurity: Innovation Needed

Top 10 Data Breaches of the 21st Century

This article looks into the biggest data breaches of the 21st century (so far!). By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Top 10 Data Breaches of the 21st Century

Why the Education Sector Must Address Security in The Rush to Digitise

By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Why the Education Sector Must Address Security in The Rush to Digitise

How to Keep Your Children Safe in Remote Learning Situations

By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , , , , , , , , | Comments Off on How to Keep Your Children Safe in Remote Learning Situations

Unlocking the Promise of Packet Capture

By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Unlocking the Promise of Packet Capture

The Serverless Security Machine

By Art  Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Serverless Security Machine

Emotet Attacks Surge in 2020, but Could Be Prevented

By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Emotet Attacks Surge in 2020, but Could Be Prevented

Has Your Data Been Leaked to the Dark Web?

By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Has Your Data Been Leaked to the Dark Web?

Data Migration Security

WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Data Migration Security

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X