Readiness and Risk Exposure in the New Normal
By Cyber Defense Magazine News Staff A recent report conducted by Osterman Research and sponsored by TrapX Security[1] provides valuable insights on the problems facing cybersecurity professionals in protecting their […]
How to Keep Your Children Safe in Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]
NCSAM Provided an Opportunity to Reset Our Approach to Cybersecurity
October marked National Cyber Security Awareness Month, but experts warn that cybersecurity requires attention 24/7/365 By Sam Humphries, Security Strategist, Exabeam Earlier this year in the rapid transition to a […]
Unlocking the Promise of Packet Capture
By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]
The Serverless Security Machine
By Art Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]
The One-Stop Spear Phishing Defense Guide You Will Ever Need
By Jeff Penner, Senior Manager at ActiveCo Technology Management. Is your business ready to combat spear phishing attacks? It’s a question that gives many seasoned CTOs bad jitters. The truth […]
Cybersecurity Best Practices for End Users
By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]
How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night
Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations […]
Mitigating the Pitfalls of Onedrive Security
By Veniamin Simonov, Director of Product Management, at NAKIVO Inc. With COVID-19 triggering a potential long-term shift to working from home, SecOps teams are coming under increasing pressure to keep […]
Zero Trust Model Is Meaningless Without TLS Inspection
Protecting users against modern, invisible cyber threats By Babur Khan, Technical Marketing Engineer at A10 Networks A security strategy is only as strong as its weakest point. No matter how […]
Emotet Attacks Surge in 2020, but Could Be Prevented
By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]
No Meows Is Good News: Proactive Nosql Database Security in The Era of Meow Attacks
By Jack Harper, Director of Professional Services at Couchbase This summer, a spate of cyberattacks in which cybercriminals targeted internet-connected ElasticSearch and other unsecured databases continued to fuel concerns about […]
Has Your Data Been Leaked to the Dark Web?
By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]
Data Migration Security
WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
Perfecting Your Cybersecurity Sales Process
By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]
The Impact of Ransomware on Cloud Services and How to Stop Attacks
By Davit Asatryan, Product Manager, Spin Technology Cloud technology and services continue to gain popularity due to their ability to allow businesses to cut costs, improve an outdated IT infrastructure, […]
How COVID Tests the Resilience of Your Cloud Data Infrastructure
By Noah Johnson, Co-founder & CTO, Dasera In recent years, we’ve seen a massive shift as companies eliminate the physical restraints of IT infrastructure and its users by moving to […]
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people […]
Why Cybersecurity Awareness is More Important During COVID-19
Do you know the need for cybersecurity training for your organization? If not, learn more about the importance! By Susan Alexandra, Contributing Writer Cyber-attacks, malicious activity, and phishing scams have […]
3 Educational Cyber Security Steps for The Protection of Your Personal Data
By Ankit Rajpurohit Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen […]
Changing Cybersecurity Culture One Habit at A Time
By George Finney, Chief Security Officer for Southern Methodist University and Author of Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future My first job out of college […]
4 Reasons Why Cyber Security Is Important in Your Business
By Gabe Nelson, Content Specialist, Bonus.ly Cyber-attacks are incredibly common and anyone can fall victim to them. Cyber-attacks can cause electrical blackouts, failure of military equipment, and breaches of national […]
Psychological Operations in A Modern Landscape
By Milica D. Djekic At the current time, people are talking about many issues and opinions. They use the internet and other media to share their thoughts, opinions, and perspectives. […]
Why Endpoint Protection Should Be a Security Priority
Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]
The Serverless Security Machine
By Art Sturdevant, Director of Operations, Censys Servers are bullshit. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]
The Impact Of Blockchain & Crypto On Cyber Security
By Jesús Cedeño, Senior Editor, cryptocoinsociety.com These days many people (especially if they’re more or less tech-oriented) have heard about cryptocurrencies and blockchains. Even if they don’t fully understand these […]
How To Protect Your Self-Driving Car From Potential Cyber Threats
Automotive Cyber Threats By Okonkwo Noble, travel enthusiast, Writer, and Electrical Electronics Engineer, Limo services U.S.A With the increasing reliance on technology in most global economic sectors, the transportation industry […]
Measuring Cybersecurity Systems Durability
By Joseph Kirkpatrick, President, Kirkpatrick Price Developing sound cybersecurity systems is a complex, multi-faceted task– but a crucial one. Not only do these systems help businesses meet their regulatory requirements, […]
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security By Kaushik Narayan, CTO Cloud Business Unit, McAfee While cloud services deliver on promised savings and convenience, they still […]