Europe Cybersecurity Market Size to Steer At 13% CAGR To 2025
Europe Cybersecurity Market is estimated to be over USD 25 billion in 2018 and is expected to register a lucrative growth between 2019 and 2025 with a CAGR of over […]
The Ultimate Guide to SSL/TLS Decryption
Six Features to Consider When Evaluating SSL/TLS Inspection Solutions By Babur Khan, Technical Marketing Engineer, A10 Networks Encrypted traffic accounts for a large and growing percentage of all internet traffic. […]
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling […]
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management […]
Really, Imagine a Day Without Water
By Michael Yehoshua On October 23, toothpaste maker Colgate and world champion swimmer, Michael Phelps, the ambassador for the company’s Save Water initiative, headed over 1,100 organizations across the United […]
Browser Extensions Are a Leaky Vessel for Phishers to Exploit
By Atif Mushtaq, CEO, SlashNext Some of the most common and helpful ways to optimize web browsers are by adding extensions, such as those offered by Google Chrome. These typically […]
Hindsight Is 2020: Three Security Visions for The Start of The New Decade
By Dan Cole, Director, Product Management, ThreatConnect With the advent of the next decade upon us, predictions for the future are sure to abound. Prophets will prophesy, forecasters will forecast, […]
New Security Report Highlights Trends in Mid-Market Business Malware
By Emil Hozan, Security Analyst, WatchGuard Technologies As the security landscape continues to grow and shift, WatchGuard’s Threat Lab research team continues to offer insights into the latest malware and […]
Out-Smarting the Cybersecurity Skills Shortage
By Ofer Or, VP of Product, Tufin Organizations across the globe are struggling to recruit the talent they need for their open security roles. Unfortunately, the problem is expected to […]
The Growing Costs of Cyber Attacks on UK Small Businesses
By Dan Baker, Content Writer, SecureTeam The amount of cyber attacks in the UK and across the world continues to grow each year and small businesses are increasingly the targets […]
Multifactor Authentication & The Sobering Reality for Organizations Without It
By François Amigorena, CEO and founder, IS Decisions Organizations without multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. Compromised credentials are […]
The Internet Got Safer In 2019: A Cybersecurity Year in Review
By Daniel Kanchev, Chief Enterprise Architect, SiteGround It’s just a fact: In 2019 the Internet got safer by default. SSL encryption adoption is now at an all-time peak, with the […]
How to Become a Cybersecurity Sleuth?
By Edith Santos, Director of Global Incident Response for NTT, Ltd. So, you want to become a cybersecurity sleuth? Excellent! We need you and so does everyone else. A quick […]
BeyondTrust Cybersecurity Predictions for 2020 & Beyond
2020 Prediction Contributors: Morey Haber, CTO/CISO at BeyondTrust and Christopher Hills, Sr. Solutions Architect, Office of the CTO at BeyondTrust It’s possible that the earliest security predictions began on that […]
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research […]
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an […]
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
By Yasir Liaqatullah, vice president of product management at A10 Networks A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access to the software as a […]
New Cybersecurity Trend: Hackers Impersonating Other Hackers
By Jonathan Drake, Senior Intelligence Analyst at Optiv Security Cyber threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary from organization to organization, typical threat […]
Software Defined Perimeter Deep Dive & Required Implementation Readiness
By Parthasarathi Chakraborty SDN, SDWAN & SDP have frequently encountered terminologies to the technology professionals these days. It is necessary to understand each of these terms before making any technology […]
How Cybersecurity Became a Major Issue for Your Business’ SEO
By Chester Cybersecurity is no longer a niche issue that you can afford to ignore. Every year, half of all businesses report being hacked, and this can cause huge problems […]
How to Erase Data from Mobile Devices: Four Common Misconceptions
By Mark Dobson, ITAD Specialist, NextUse When you’re about to retire dozens or hundreds of your employees’ mobile devices, you don’t want the company data stored on them to end […]
Here’s How You Can Secure Your App from Cyber Attacks
By Twinkle Do you know how many people own a smartphone? Well, you’ll be shocked to know that as per the researchers estimate the total number of mobile device users […]
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts, […]
Modernize the Mission: Implementing TIC 3.0 and Zero Trust Networking
By Stephen Kovac, Vice President, Global Government Head of Corporate Compliance, Zscaler, Inc. Today’s workplace functions on the expectation of mobility – work from any device at any location. While […]
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from […]
Lock, stock and two smoking … access controls
By Milica D. Djekic The point of this article would not be to deal with some of London’s gangs, but rather to present what the access control is and why […]
The implementation of SOCs with the SMEs
By Milica D. Djekic The security operations centers (SOCs) are cybersecurity systems that are capable to provide security in a both – technological and organizational manner. Through this review, we […]
How a Cyber Attack Could Kill Your Website – Permanently
By Phillip Adcock, Managing Director, Shopping Behaviour Xplained Ltd Shopping online has become the standard way to do things. But with many shoppers wary of online services, site owners should […]
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis […]
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as […]