A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

Cybersecurity: Innovation Needed

Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Cybersecurity: Innovation Needed

Learning Hardware Security Via Capture-The-Flag Competitions

By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Learning Hardware Security Via Capture-The-Flag Competitions

Magecart May Make Holidays Less Merry

Third-party plug-ins driving most retail sites can open doors to attackers by Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks In the unprecedented year of 2020, the rise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Magecart May Make Holidays Less Merry

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

Readiness and Risk Exposure in the New Normal

By Cyber Defense Magazine News Staff A recent report conducted by Osterman Research and sponsored by TrapX Security­[1] provides valuable insights on the problems facing cybersecurity professionals in protecting their […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Readiness and Risk Exposure in the New Normal

How to Keep Your Children Safe in Remote Learning Situations

By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , , , , , , , , | Comments Off on How to Keep Your Children Safe in Remote Learning Situations

The Serverless Security Machine

By Art  Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Serverless Security Machine

Cybersecurity Best Practices for End Users

By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Cybersecurity Best Practices for End Users

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Emotet Attacks Surge in 2020, but Could Be Prevented

By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Emotet Attacks Surge in 2020, but Could Be Prevented

Has Your Data Been Leaked to the Dark Web?

By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Has Your Data Been Leaked to the Dark Web?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X