The Privileged Credential Security Advantage
By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security risks for enterprises: privileged accounts lead to data breaches. So […]
E-Merchants: Secure Your Online Sales from Cybersecurity Threats
By Anthony Webb, EMEA Vice President, A10 Networks This year, online retailers pushed the boundaries with “Black Friday” deals in the hopes of improving their online sales, thanks to the […]
Asset Management, The Weakest Link in Cybersecurity Risk
By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the limitations of existing asset management solutions for Cybersecurity needs and […]
Businesses Should See Security as An Enabler of Digital Transformation, Not A Hindrance
A distributed workforce has renewed the importance of security for all aspects of organizations’ technology estates By Matt Gyde, CEO, Security Division at NTT Ltd. The pandemic has put a […]
Anatomy of a hack – Solar Winds Orion
Nation-State hacks major IS Software vender By James Gorman, CISO, Authx What happened when one of the leading IT to support vendors in the world, leading government agencies the world […]
Communication Streaming Challenges
By Milica D. Djekic As it’s well-known, there are a lot of ways of tracking someone’s e-mail, chat, or social media accounts. The defense professionals are quite familiar with such […]
Cryptocurrency Ransomware Is on The Rise During COVID-19 – Here’s What Businesses of All Sizes Need to Know About Dealing with Attacks
By Marc Grens, Co-Founder & President at DigitalMint Crypto-related ransomware attacks are on the rise, and the pandemic has only hastened its propagation. For example, from 2018 to 2020, ransomware […]
Businesses Must Protect Their Most Critical Asset: Their Data
By Trevor J. Morgan, Ph.D., Product Manager at comforte AG Protecting sensitive data is a challenge facing every business and enterprise. The value of data is rising to the extent […]
Securing Digital Identities in A Predominantly Remote World
COVID-19 and the subsequent uptick in targeted cyberattacks accelerate the need for biometric-based digital onboarding By Bob Eckel, President & CEO, Aware, Inc. As we entered 2020, organizations were beginning […]
3 Email Hacking Techniques to Watch In 2021
By Adrien Gendre, Chief Product & Services Officer, Vade Secure Ransomware hobbled businesses in 2020, while COVID-19 spawned an endless stream of cyberattacks. What both have in common is email. […]
The Future of Security Is on The Hardware
The Virtualization Revolution Removes Security Onus From Users by Leveraging New Hardware-Powered Approach By Ian Pratt, Global Head of Security, HP Today’s threat landscape is constantly evolving, and the COVID-19 […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps
By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the […]
Amidst Election Noise, Cybercriminals See an Opportunity with Retail
By Chris Kennedy, CISO & VP of Customer Success, AttackIQ More than seven months into the onset of the novel coronavirus, it feels strange to look back on the things […]
All Aboard The COVID-19 Train: Malware Trends Taking Advantage of The Pandemic
By Bar Block, Threat Intelligence Researcher at Deep Instinct Since the outbreak of COVID-19, plenty of COVID-19 themed malware attacks have surfaced around the globe. Attackers take every chance they […]
Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications
By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]
The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year
By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to […]
Data Migration Security
What to Know By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
Why the Education Sector Must Address Security in The Rush to Digitise
By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]
Telegram for Business Communications: Understanding The Risks And Rewards
By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted […]
Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!) By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece, […]
Nations—Not Individuals—Are After Your IP
By Ryan Benner, Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted […]
For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge
By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively […]
Patched Minimizes Risk – But Opens the Door for Compatibility Problems
How to Remediate Federal Systems with Zerologon Vulnerability By Egon Rinderer, Global Vice President of Technology & Federal CTO, Tanium In September, the Cybersecurity and Infrastructure Security Agency (CISA) released […]
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]
Readiness and Risk Exposure in the New Normal
By Cyber Defense Magazine News Staff A recent report conducted by Osterman Research and sponsored by TrapX Security[1] provides valuable insights on the problems facing cybersecurity professionals in protecting their […]
How to Keep Your Children Safe in Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]
Unlocking the Promise of Packet Capture
By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]