Three Key Business Lessons From The Founder of a Big Data Security Company
By MacLane Wilkison, Co-Founder of ZeroDB When startups mix with corporations we see an oil-and-water effect. There’s often a gap in work practices, organizational structure, and managerial outlook, not to […]
No One Likes Passwords, So Why Are We Still Using Them?
Users Deserve Better, Websites Need to Deliver By Charles Durkin, Chief Executive Officer, Privakey Creating a new online account is a dreaded task for most internet users. Complexity and security […]
The packet analysis as a helpful way of network monitoring
By Milica D. Djekic The internet packets are the sets of information being created and transmitted to carry on a message through the network’s communications. These packets may consist of […]
Layered Security
Two locks are better than one By David Share, Director, Amazing Support Imagine you had a million dollars (or pounds). Heck, let’s go crazy and say you have a billion […]
Cybersecurity: Why Your Cell Phone is Your Weakest Link
The internet of things. It’s a wonderful product of society’s love of technology and needs to make daily tasks more efficient. Think about it. How many devices do you own? […]
Belfast – The New Hotbed for Cybersecurity Talent
By Olivier Vallez New York, NY – Like many people, my perception of Northern Ireland conjures images of dreary weather, stone thatched houses, and when it comes to industry, perhaps […]
Privacy and Security Issues in Autonomous Cars
By David Navetta, Boris Segalis, and Kris Kleiner, Norton Rose Fulbright US LLP As the development of self-driving car technology progresses, the prospect of privately-owned autonomous vehicles operating on public […]
5 mistakes hindering effectiveness of SIEM solutions: Learning from real-life cases
With a SIEM solution installed, the security department can think it’s time to grab some popcorn and watch the system perfectly dealing with all possible threats impending their networks. Ah, […]
E-Recycling: Exploring the “End-of-Life” Issues for Connected Devices
A brief digest from the E-Scrap Conference & Trade Show 2019 Orlando, FL – What happens to our beloved tech devices when they die? Wouldn’t it be great if the […]
OPEN ACCESS APIs
WHAT NEEDS TO BE DONE TO MAKE THE PLATFORM MORE SECURE By David Midgley, Head of Operations, Total Processing I’m sure if you’re reading this, you already have a reasonable […]
SecurityScorecard – Risk Assessment Made Simple!
An interview with Susanne Gurman of SecurityScorecard, from Black Hat 2019 Las Vegas, NV – Amidst all the hustle and bustle of Black Hat 2019, I was privileged to have […]
The Evolving Landscape of Cybersecurity for SME’s
A brief digest from the SecureWorld New York 2019 New York, NY – With all the high-profile cyberattacks receiving coverage in the media as of late, cybersecurity is quickly becoming […]
The implementation of SOCs with the SMEs
By Milica D. Djekic The security operations centers (SOCs) are cybersecurity systems that are capable to provide security in a both – technological and organizational manner. Through this review, we […]
Best Practices for Remote and Branch Office Data Protection
By Gregg Petersen, Regional Director, Middle East, and SAARC, Veeam Software We’ve all heard about fantastic new data center technologies, but all too often it looks like these technologies only […]
How a Cyber Attack Could Kill Your Website – Permanently
By Phillip Adcock, Managing Director, Shopping Behaviour Xplained Ltd Shopping online has become the standard way to do things. But with many shoppers wary of online services, site owners should […]
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis […]
How to protect an enterprise from physical attacks
By Yana Yelina, Tech Journalist, EffectiveSoft Nowadays, none of the enterprises is immune to cyberattacks, data breaches, malware, and other types of damage. As a result, news about information leakage […]
Threat intelligence collection in a developing world
By Milica D. Djekic As it’s known – threat intelligence collection is mainly increasing in developing countries. These countries could be a source of the real risks, threats, and challenges […]
How to Defend Against the Next DDoS Attack
By Cricket Liu, Chief DNS Architect at Infoblox I’m sure you’ve been following the news of the recent distributed denial of service (DDoS) attack against Dyn. Here’s my take on […]
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as […]
Wi-Fi Security Worries and the Critical Nature of Classification
By Ryan Orsi, Director of Strategic Alliances at WatchGuard Technologies Open public Wi-Fi hotspots are experiencing explosive growth. According to Cisco’s latest Visual Networking Index Forcast, by 2020, public Wi-Fi […]
It’s the Industry Titans Against the Federal Deities
Ensuring zero intrusion with best practices in the encryption software industry By Anamika Kumari, Content Writer, Allied Analytics LLP Veracrypt tracked the success route of Truecrypt with great agility. The […]
Mission Critical Security and the Rise of the Private Internet of Things
By Stewart Kantor, CFO/President, Ondas Networks We live in a world where constant data connectivity has become the standard, allowing us to access information from any number of devices operating […]
Are your critical systems lying to you? Protecting SCADA Systems from Data Forgery
By Michael Shalyt, VP Product Aperio Systems (www.aperio-systems.com) Like many things in life, the greatest cyber threat to critical infrastructure is in the things we cannot see. Both security analysts […]
Business Risk Intelligence: A Necessity Across the Enterprise
By Josh Lefkowitz, CEO at Flashpoint While the Deep & Dark Web has yielded important security considerations for some time, it’s really been in the last 18 months that the […]
The anniversary of EMV roll-out: criminals are anxious to beat the system
By Andrei Barysevich Introduced by the financial industry in the early 2000s, EMV smart payment cards have largely supplanted magnetic stripe technology, and for good reason. Due to concerns surrounding […]
The independent wireless networks
By Milica D. Djekic The wireless technologies would actively attract the researcher’s attention during the last few decades. The era of wireless information transfer has begun around two centuries ago […]
2 Sure Ways To Prevent Cyber Crime
By Laban Moturi, Blogger and Writer. From writersbase.org writing company The World has come close and closer with the usage of the internet. With the growth of this, many evils […]
Security Orchestration is more than Automation
The Myth of the Unmanned SOC By Amos Stern, CEO, Siemplify It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal […]
A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
By David Barton, Chief Information Security Officer, Forcepoint At the height of merger-mania, eager participants frequently viewed cybersecurity as an afterthought. “Let’s just make this acquisition work,” they’d reason, “and […]