Looks Like Russian Hackers Are on An Email Scam Spree

By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Looks Like Russian Hackers Are on An Email Scam Spree

Network Security Is Not Data Security

Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Security Is Not Data Security

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

Should We Be Worried About Vehicle Hacking?

And what can we do about it? By Martin Banks With more connected devices than ever, cybersecurity is a more prominent issue today than ever before. You’ll see articles and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Should We Be Worried About Vehicle Hacking?

How To Fight A Virus: Lessons From Cybersecurity

By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on How To Fight A Virus: Lessons From Cybersecurity

IOT Security Embedded in Memory Cards

AS DEVICES, MACHINERY AND MANUFACTURING PLANTS GET SMARTER, THEY ALSO BECOME MORE VULNERABLE. By Hubertus Grobbel, Vice President Security Solutions, Swissbit. When designing networked devices, machinery, and production facilities, developers […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on IOT Security Embedded in Memory Cards

Managing Small Business Cybersecurity During Covid-19

By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Managing Small Business Cybersecurity During Covid-19

Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

By Rick Vanover, Senior Director, Product Strategy, Veeam The damage ransomware can inflict on businesses is staggering. For businesses who feel they have no choice but to pay cybercriminals in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Mitigating Against Ransomware: Don’t Let Backups Be the Back Door

The Devil Inside

Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on The Devil Inside

Cyber Crime is Paying

What the Evolution of Ransomware Means for the Security Industry By Ricardo Arroyo, Senior Technical Product Manager, WatchGuard Technologies If you were talking to a retired police officer or FBI […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cyber Crime is Paying

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X