Vulnerability Patching: Why Does It Fall Short So Often?
Weak threat insight, SecOps competing priorities, and fear of making things worse are key reasons By Chris Goettl, Director of Security Product Management, Ivanti It isn’t glamorous. It won’t guarantee […]
Data Risk, Intelligence and Insider Threats
When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with is that of the insider threat. While the term is typically associated […]
Cyber Threats Facing Financial Institutions Amid COVID-19
By Pablo Castillo, Cyber Threat Research Analyst, Constella Intelligence COVID-19 has accelerated security research into the cybersecurity implications of our society where large swaths of the population are fully remote. […]
Cyber Resiliency Will Become the New Normal In 2021 Combating the Rise of Ransomware
By Drew Daniels, CIO and CISO, Druva This past year, cyber resiliency proved to be a vital asset to ensure business continuity, and it’s one that will continue to take […]
Hackers attempted to poison the water supply of a US city
Pinellas Sheriff revealed that attackers tried to raise levels of sodium hydroxide, by a factor of more than 100, in the Oldsmar’s water supply. The scenario described by Pinellas Sheriff […]
Credit Cards, Cash and Compliance, Oh My! Eliminating Audit Fatigue in The Financial Services Sector
By Steve Horvath, Vice President, Strategy & Cloud, Telos Corporation When we think of our finances, we think of them as a responsibility – a commitment to ensure payments are […]
Personal Data Breaches for GDPR Compliance: Everything You Need to Know
By Dan May, Commercial Director, ramsac In the new era of cybercrime, identifying the proper sanctions and reactions for any business can seem challenging, if not confusing. When it comes […]
3.2billion records leaked, Part II
The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular hacking forum. More than 3.2 billion unique pairs of cleartext […]
Hackers abuse Plex Media servers for DDoS amplification attacks
Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Security researchers from Netscout discovered DDoS-for-hire services have found a way to abuse Plex […]
Over 3.2 billion emails and passwords hacked…find out if you are a victim and what to do about it…
It’s time to consider new passwords and multi-factor authentication or password management tools The current breach is really a compilation of many breaches, hence it’s name “Compilation of Many Breaches” […]
A Third Of Americans Trust Facebook With Personal Data More Than Government, Study Shows
The level of trust in Facebook versus the government also varies between demographic groups. By Kathryn Robinson, Privacy Expert, Privacy Tiger In today’s ever-changing data-driven society, it’s a challenge for […]
2021 Predictions: Addressing the Challenge of Cloud-Native App Security
By Ankur Singla, Founder and CEO of Volterra Organizations of all sizes are adopting cloud-native application design and deployment practices as they continue to digitally transform business processes. This includes […]
5G Security
Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies 5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications […]
SonicWall released patch for actively exploited SMA 100 zero-day
SonicWall has released a security patch to address the zero-day flaw actively exploited in attacks against the SMA 100 series appliances. SonicWall this week released firmware updates (version 10.2.0.5-29sv) to […]
More Internal Security Needed, Less Budget – 10 Tips to Help
By Jody Paterson – Founder and Executive Chairman. ERP Maestro As if internal risks of fraud and data breaches were not high enough, enter in a year of new work […]
2021 Predictions: Securing the API Economy, Identity and Rigorous Consent Controls
By Nathanael Coffing, CSO, Cloudentity It goes without saying that 2020 was an unprecedented year and the security landscape was completely transformed for cybersecurity professionals. Due to COVID-19 and the […]
The 2021 Perspective – Challenges and Milestones for The VPN Industry
By Sebastian Schaub, CEO and Co-Founder, hide.me VPN The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double in value over the next […]
Experts discovered a new Trickbot module used for lateral movement
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target organization. Cybersecurity researchers discovered a new module of the Trickbot […]
Emotet Botnet dismantled in a joint international operation
A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law enforcement, lead by Europol, has dismantled the infrastructure of the […]
Threat actors took over the domain name perl.com and pointed it to an IP address associated with malware campaigns.
Attackers have taken over the official domain name of The Perl Foundation perl.com and pointed it to an IP address associated with malware campaigns. Users are recommended to avoid visiting […]
How To Keep Your Children Safe In Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault As parents, we have conflicting feelings on remote learning. One on hand, we want our children to stay healthy, especially in […]
E-Merchants: Secure Your Online Sales from Cybersecurity Threats
By Anthony Webb, EMEA Vice President, A10 Networks This year, online retailers pushed the boundaries with “Black Friday” deals in the hopes of improving their online sales, thanks to the […]
The Rising Tide of Security Threats in The Industrial Internet of Things
By Don Schleede, Information Security Officer at Digi International Throughout Cyber Security Awareness Month in October, many organizations shared their thoughts on the state of cybersecurity and reflected on the […]
Asset Management, The Weakest Link in Cybersecurity Risk
By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the limitations of existing asset management solutions for Cybersecurity needs and […]
Businesses Should See Security as An Enabler of Digital Transformation, Not A Hindrance
A distributed workforce has renewed the importance of security for all aspects of organizations’ technology estates By Matt Gyde, CEO, Security Division at NTT Ltd. The pandemic has put a […]
Cybersecurity Maturity Model Certification (CMMC)
It is not about compliance, or is it? By Carter Schoenberg, CISSP & CMMC Registered Practitioner Vice President – Cybersecurity SoundWay Consulting, Inc. As of the date of this publication, […]
Anatomy of a hack – Solar Winds Orion
Nation-State hacks major IS Software vender By James Gorman, CISO, Authx What happened when one of the leading IT to support vendors in the world, leading government agencies the world […]
Communication Streaming Challenges
By Milica D. Djekic As it’s well-known, there are a lot of ways of tracking someone’s e-mail, chat, or social media accounts. The defense professionals are quite familiar with such […]
E-Commerce and Lockdown: The Perfect Storm for Cyber Threats
The impact of lockdowns on cybersecurity By Aman Johal, Lawyer and Director of Your Lawyers The UK’s National Cyber Security Centre (NCSC) reported that a quarter of all cyberattacks over […]
Cryptocurrency Ransomware Is on The Rise During COVID-19 – Here’s What Businesses of All Sizes Need to Know About Dealing with Attacks
By Marc Grens, Co-Founder & President at DigitalMint Crypto-related ransomware attacks are on the rise, and the pandemic has only hastened its propagation. For example, from 2018 to 2020, ransomware […]