Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

Everything You Want to Know About Single Sign-On

By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Everything You Want to Know About Single Sign-On

How To Fight A Virus: Lessons From Cybersecurity

By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on How To Fight A Virus: Lessons From Cybersecurity

IOT Security Embedded in Memory Cards

AS DEVICES, MACHINERY AND MANUFACTURING PLANTS GET SMARTER, THEY ALSO BECOME MORE VULNERABLE. By Hubertus Grobbel, Vice President Security Solutions, Swissbit. When designing networked devices, machinery, and production facilities, developers…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on IOT Security Embedded in Memory Cards

Managing Small Business Cybersecurity During Covid-19

By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Managing Small Business Cybersecurity During Covid-19

Digital Healthcare: How Secure Is the Care Data?

By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing,…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Digital Healthcare: How Secure Is the Care Data?

The Devil Inside

Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on The Devil Inside

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X