Three Tips to Avoid Going Phishing
By Travis Rosiek, CTO, Tychon It’s an old trick in the physical world. Getting into a secured building is easiest if an infiltrator can get an authorized person to open […]
The Fatal Danger Lurking in Today’s Fortune 500
By Tatu Ylonen, founder and SSH Fellow, SSH Communications Security It takes a special combination of leaders, ideas, and processes to become a Fortune 500 company. By the time an […]
Ransomware and the Internet of Things
By David Balaban IoT ransomware is more dangerous than traditional ransomware Ransomware has become one of the most serious cyber threats these years. Today, all of us – from home […]
New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for […]
Cyber Security the Major Issue of 2019
By Angelica Technology has provided services to the whole humanity like no time ever before. Now in this contemporary world, everything is connected such as cars, cities, planes, homes and […]
Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
By Anas Baig If the recent anti-privacy bill’s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their […]
Tesco Bank
Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as […]
Why today’s university students pose a massive cyber threat — and what to do about it
By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young […]
PART II: DEFENDING YOUR AIRSPACE
WIPS vs. WIDS By Ryan Orsi, Director Product Management, WatchGuard Technologies In part one of this series: The Anatomy of a Wi-Fi Hacker, we addressed the ever-growing need for a […]
Cyber Security Risks on Social Media
By Simon Parker at Minerva Security As technology advances, social media has gained popularity over time. It has provided a platform where people can freely express their feelings and get […]
The Human in the Middle
Behavioral Design for Cybersecurity By Alex Blau, Vice President, ideas42 In this ever-maturing digital era, using technology to solve our everyday problems feels like an obvious thing to do. Yet, […]
Phishermen
How Insider Threats are Realized By Daniel Jetton, VP Cyber Services, OBXtek, Inc. While technical security problems can be dealt with through technical solutions, people must be approached in a […]
Look into my Crystal Ball; let’s see what 2020 has in store
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. The Christmas hangovers are starting to clear, every advert on TV seems to tell me that I need to begin the 2020diet […]
The challenges of an Internet of Things analytics
By Milica D. Djekic Through a history – we would notice the importance of good analytics in many areas of human activities. For instance, many military strategists would deal with […]
Addressing the government data security problem
By Marcelo Delima, Global Product Marketing Manager at HPE Security – Data Security Throughout federal, state, and local governments, the digital revolution is driving exponential growth of high-value data. Personally […]
10 cyber security measures growing companies should implement
Tips to keep your business safe as it expands By Asher de Metz, Lead Senior Consultant (Information Security), Sungard Availability Services (Sungard AS) This may surprise you, but growing companies […]
Best Practices to keep your Home WiFi Secured
by Lisa Barrie, Sub-editor at List Enthusiast Wi-Fi internet or traditional wired internet? Ask any person and he/she’ll go for the former. The ease-of-use, easier installation, and maintenance mean Wi-Fi […]
Multi-factor Authentication Implementation Options
“2FA to 5FA – What are the options available?” By David Smith Independent Consultant at Smart Card Institute At some point of time, we have all used an OTP (One-time […]
The Dangers of the Integrated Home/Workplace
Personal data breaches are one of the fastest-growing cybercrimes in the US. As IoT devices become increasingly common at home and in the workplace, measures must be taken to secure […]
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to […]
Ready Position – Proactive Teams are Helping Solve the Cyber security Skills Shortage
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Some of the fans glancing toward the outfield at a baseball game may be recalling their own Little League days. […]
Public Sector Beware: 3 Steps to a Better Cyber attack Prevention Strategy
By Phil Richards, CISO, Ivanti Just as healthcare organizations were a popular target of ransomware attacks over the past two years, public sector organizations (including school districts, municipalities and local […]
How the Internet of Things Could Compromise Online Security
By Chris Usatenko, Content Creator, EveryCloud The concept of an Internet of Things has been a dream held by many tech geeks. Up until a few years ago, though, the […]
Data Risk Report Shows Lack of Security across Industries
87% of companies lack data security By Rob Sobers, software engineer, Varonis When it comes to cybersecurity, one of the top concerns is the risk and vulnerability of sensitive data. […]
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for […]
Ransomware: A Municipality’s Achilles Heel
By Russ Cohen, Vice President of Cyber Services, Chubb From large metropolitan cities like Atlanta to smaller communities like Key Biscayne, every city in America is vulnerable to cyber-attacks. In […]
Understanding Application Risk Management
By Haythem Hammour, Product Marketing Manager, Brinqa On April 25, Docker®[1] discovered a breach of unauthorized access to a single Docker Hub database storing a subset of non-financial user data. […]
Have You Asked your eDiscovery Vendor
These 6 Essential Data Security Questions? By Brian Schrader, Esq., president, and CEO, BIA In today’s world of ever-increasing data theft, network hacks and other cyber threats, companies of all […]
Attracting and Retaining Staff for a Fusion Center
The best way to collaborate talent within a security eco-system By Karl Sharman Fusion Centers were formed following the devastating 9/11 terrorist attacks in New York and now mainly form […]
Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced […]