How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

Russian government claims to have dismantled REvil ransomware gang

Russia’s FSB announced to have dismantled the REvil ransomware gang, the infamous group behind Kaseya and JBS USA. The Russian Federal Security Service (FSB) announced to have shut down the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Russian government claims to have dismantled REvil ransomware gang

The Top 6 Cyber Attacks Of 2021 So Far

By Nicole Allen, Marketing Executive, Salt Communications. Cyberattacks have been on the rise for years, and the trend shows no signs of slowing down. To add salt (no pun intended) […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on The Top 6 Cyber Attacks Of 2021 So Far

Maximizing the Impact of AI/ML Threat Detection Tools

By Cary Wright, VP Product Management, Endace Companies are increasingly looking to Artificial Intelligence (AI) and Machine Learning (ML) threat detection tools to improve the security posture of the enterprise. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Maximizing the Impact of AI/ML Threat Detection Tools

ChaChi, a GoLang Trojan used in ransomware attacks on US schools

A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on ChaChi, a GoLang Trojan used in ransomware attacks on US schools

Uncovering hidden cybersecurity risks

By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical vulnerabilities in their software and firmware, lurking just beneath the surface of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Uncovering hidden cybersecurity risks

DHS announces security measures for critical pipeline industry

The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for critical pipeline owners and operators. The Colonial pipeline incident continues to have a serious impact on the critical […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on DHS announces security measures for critical pipeline industry

Executive Protection Needs to Include Digital

By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks and dangers inherent to their executives’ security. Executive Protection is an established […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Executive Protection Needs to Include Digital

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X