Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

Mitigating Risk from Insider Threats in 2022

By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Mitigating Risk from Insider Threats in 2022

Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per record on the black market, while stolen payment card data is sold…

Posted in Uncategorized | Tagged , , , , , , | Comments Off on Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X