Zero Trust Remote Access for Engineering Teams
By Colin Rand, VP of Engineering, Banyan Security Engineering organizations present numerous challenges for security programs when it comes to remote access. They need secure access to dynamic hosts, services, […]
Businesses Must Protect Their Most Critical Asset: Their Data
By Trevor J. Morgan, Ph.D., Product Manager at comforte AG Protecting sensitive data is a challenge facing every business and enterprise. The value of data is rising to the extent […]
Securing Digital Identities in A Predominantly Remote World
COVID-19 and the subsequent uptick in targeted cyberattacks accelerate the need for biometric-based digital onboarding By Bob Eckel, President & CEO, Aware, Inc. As we entered 2020, organizations were beginning […]
5 AIOps Trends That Will Shape 2021
By Tej Redkar, Chief Product Officer at LogicMonitor If 2020 has taught us anything, it is that life is nothing if not unpredictable. Yet, the unforeseen possibilities of tomorrow are […]
3 Email Hacking Techniques to Watch In 2021
By Adrien Gendre, Chief Product & Services Officer, Vade Secure Ransomware hobbled businesses in 2020, while COVID-19 spawned an endless stream of cyberattacks. What both have in common is email. […]
Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!). By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
How We Securely Share Data in A Remote World
By Duncan Greatwood, CEO, Xage Security Cybersecurity solutions are often thought of as a single-issue solution: protecting companies from dangerous or costly hacks, or detecting hacks after they’ve already happened, […]
A Hybrid Workplace Means New Threats and More Pressure on IT Leaders
By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]
Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps
By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the […]
Making the Journey to the Intelligent SOC
AI, Machine Learning, and Open-XDR Make it Easier By Albert Zhichun Li, Chief Scientist, Stellar Cyber Most enterprises and service providers are building security operations centers (SOCs) where a team […]
What’s in Your Wallet? The Cybersecurity Costs of COVID
With new business challenges in play, organizations are shifting their cybersecurity spend accordingly By Mark Sangster, Vice President, and Industry Security Strategist, eSentire If anything has become clear over the […]
The Coming Security Perspectives
By Milica D. Djekic It appears that today’s world landscape is under constant and chronical attack of security challenges. There is no time in history that was easy and it’s […]
All Aboard The COVID-19 Train: Malware Trends Taking Advantage of The Pandemic
By Bar Block, Threat Intelligence Researcher at Deep Instinct Since the outbreak of COVID-19, plenty of COVID-19 themed malware attacks have surfaced around the globe. Attackers take every chance they […]
Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications
By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]
Data Migration Security
What to Know By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
Why the Education Sector Must Address Security in The Rush to Digitise
By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]
How Are Financial Services Firms Addressing the Requirements of Digital Transformation, Security, And Compliance?
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks The financial services sector is experiencing significant commercial disruption coupled with rapid innovation as established institutions strive to […]
Telegram for Business Communications: Understanding The Risks And Rewards
By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted […]
Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Learning Hardware Security Via Capture-The-Flag Competitions
By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!) By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece, […]
Nations—Not Individuals—Are After Your IP
By Ryan Benner, Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted […]
Patched Minimizes Risk – But Opens the Door for Compatibility Problems
How to Remediate Federal Systems with Zerologon Vulnerability By Egon Rinderer, Global Vice President of Technology & Federal CTO, Tanium In September, the Cybersecurity and Infrastructure Security Agency (CISA) released […]
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]