Readiness and Risk Exposure in the New Normal

By Cyber Defense Magazine News Staff A recent report conducted by Osterman Research and sponsored by TrapX Security­[1] provides valuable insights on the problems facing cybersecurity professionals in protecting their […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Readiness and Risk Exposure in the New Normal

How to Keep Your Children Safe in Remote Learning Situations

By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , , , , , , , , | Comments Off on How to Keep Your Children Safe in Remote Learning Situations

Unlocking the Promise of Packet Capture

By Kathryn Ash, President, IPCopper, Inc. It turns out that IT people do get plenty of exercises. From the job description, it sounds like a desk job, but that promise […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Unlocking the Promise of Packet Capture

The Serverless Security Machine

By Art  Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on The Serverless Security Machine

Cybersecurity Best Practices for End Users

By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Cybersecurity Best Practices for End Users

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Emotet Attacks Surge in 2020, but Could Be Prevented

By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Emotet Attacks Surge in 2020, but Could Be Prevented

Has Your Data Been Leaked to the Dark Web?

By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Has Your Data Been Leaked to the Dark Web?

Data Migration Security

WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Data Migration Security

Perfecting Your Cybersecurity Sales Process

By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Perfecting Your Cybersecurity Sales Process

Why Endpoint Protection Should Be a Security Priority

Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Endpoint Protection Should Be a Security Priority

The Impact Of Blockchain & Crypto On Cyber Security

By Jesús Cedeño, Senior Editor, cryptocoinsociety.com These days many people (especially if they’re more or less tech-oriented) have heard about cryptocurrencies and blockchains. Even if they don’t fully understand these […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on The Impact Of Blockchain & Crypto On Cyber Security

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X