TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that. How did they accomplish this esteemed […]
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research […]
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
By Yasir Liaqatullah, vice president of product management at A10 Networks A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access to the software as a […]
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity […]
How to Stop Cybersecurity Attacks before They Start
By Dr. Johannes Bauer, principal security advisor, identity management & security, UL Cybersecurity breaches are part of the nasty reality of today’s IT infrastructure and even though they are not […]
Stressing Security Teams
By Jody Caldwell Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly complicated. People stress out when they believe that demands […]
Software Defined Perimeter Deep Dive & Required Implementation Readiness
By Parthasarathi Chakraborty SDN, SDWAN & SDP have frequently encountered terminologies to the technology professionals these days. It is necessary to understand each of these terms before making any technology […]
Cybersecurity Essentials for Small and Medium Businesses
Protect your business from hackers by knowing some of the top cybersecurity essentials you should adapt within your organization. By Peter Porr, Marketing and Brand Manager, ImageWare Systems Both government agencies […]
Here’s How You Can Secure Your App from Cyber Attacks
By Twinkle Do you know how many people own a smartphone? Well, you’ll be shocked to know that as per the researchers estimate the total number of mobile device users […]
10 Best Tips for Using Metasploit to Harden Your Network
By Tim Keary, Copywriter, Comparitech How do you know if your network is safe? Cybercrime is an everyday threat to companies. There is one hacking attack every 39 seconds. Some […]
So, Ya Wanna Be A Pen Tester, Huh?
Here are some things to consider By D. Greg Scott, Author of Bullseye Breach and Virus Bomb Do you like tearing software apart and putting it back together again, stronger […]
Simple Ways SMBs Can Protect Themselves against Cyber-Threats
By John Ford, Chief Information Security Officer, ConnectWise It seems as if every couple of weeks or so, a major news story flashes across our screens detailing a massive data […]
How to Address the Top 5 Human Threats to Your Data
By Dave Sikora The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to protect. For most businesses today, that most valuable asset […]
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts, […]
Talk About a Disaster
Fema Exposes Disaster Survivor’s Personal Data By Charles Parker, II; MBA/MSA/JD/LLM/PhD FEMA’s mission involves assisting citizens as they face natural disasters (hurricanes, wildfires, etc.). Over the years, FEMA has had […]
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that […]
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from […]
From Guards to Detectives: Evolving the Junior Security Analyst Role
By Mike Armistead, CEO and Co-Founder, Respond Software Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human roles with the support of intelligent […]
The Intersection of Artificial Intelligence and Cybersecurity
By John Harrison, Director, Cybersecurity Center of Excellence, Criterion Systems It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years, and while it […]
Achieving Cybersecurity Readiness with AI-Powered, Gamified Training
By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence “THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems […]
Facial Recognition: Killing the Password One Photo ID at a Time
By Stephen Stuut, CEO of Jumio In today’s complex cybersecurity landscape, the notion of utilizing a password to validate a The user’s authenticity is rudimentary. Cybercriminals can retrieve passwords in […]
The packet analysis as a helpful way of network monitoring
By Milica D. Djekic The internet packets are the sets of information being created and transmitted to carry on a message through the network’s communications. These packets may consist of […]
Layered Security
Two locks are better than one By David Share, Director, Amazing Support Imagine you had a million dollars (or pounds). Heck, let’s go crazy and say you have a billion […]
Belfast – The New Hotbed for Cybersecurity Talent
By Olivier Vallez New York, NY – Like many people, my perception of Northern Ireland conjures images of dreary weather, stone thatched houses, and when it comes to industry, perhaps […]
Understanding Bluetooth and its role in the Internet of Things
By Dimitri Vlachos, VP of Marketing, Pwnie Express Bluetooth technology was originally designed for continuous, streaming data applications – essentially, it was intended to replace wires to create the possibility […]
The implementation of SOCs with the SMEs
By Milica D. Djekic The security operations centers (SOCs) are cybersecurity systems that are capable to provide security in a both – technological and organizational manner. Through this review, we […]
Best Practices for Remote and Branch Office Data Protection
By Gregg Petersen, Regional Director, Middle East, and SAARC, Veeam Software We’ve all heard about fantastic new data center technologies, but all too often it looks like these technologies only […]
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis […]
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as […]
It’s the Industry Titans Against the Federal Deities
Ensuring zero intrusion with best practices in the encryption software industry By Anamika Kumari, Content Writer, Allied Analytics LLP Veracrypt tracked the success route of Truecrypt with great agility. The […]