Why Endpoint Protection Should Be a Security Priority

Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Endpoint Protection Should Be a Security Priority

The Impact Of Blockchain & Crypto On Cyber Security

By Jesús Cedeño, Senior Editor, cryptocoinsociety.com These days many people (especially if they’re more or less tech-oriented) have heard about cryptocurrencies and blockchains. Even if they don’t fully understand these […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on The Impact Of Blockchain & Crypto On Cyber Security

How Can CISOs Work with CMOs to Secure Social Media?

By Otavio Freire, CTO & Co-Founder, SafeGuard Cyber Recent reports indicate that over half of the global population now uses social media – up 10.5% on last year’s 3.5 billion […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on How Can CISOs Work with CMOs to Secure Social Media?

Acronis Cyber Readiness Report

Pandemic reveals cybersecurity gaps, need for new solutions By Peter Hale, Sr. Content Manager, Acronis As businesses around the world reacted to the COVID-19 pandemic, many had to address new […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Acronis Cyber Readiness Report

How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters

By Don Boxley, co-founder, and CEO, DH2i [https://dh2i.com] Cybersecurity researchers at the independent security research group JSOF recently discovered at least 19 security vulnerabilities that are found at the base […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters

Industrial Control System – Security Focus of Federal Effort

By Trip Hillman, Director of Cybersecurity Services at Weaver More and more, industrial control systems have been the targets of malware, ransomware, and other kinds of cyberattacks. These attacks jeopardize […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Industrial Control System – Security Focus of Federal Effort

Looks Like Russian Hackers Are on An Email Scam Spree

By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Looks Like Russian Hackers Are on An Email Scam Spree

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X