Joint Investigation Reveals Evidence of Malicious Android COVID Contact Tracing Apps
By Peter Ferguson, Cyber Threat Intelligence Specialist at EclecticIQ’s Fusion Center The devastation of the COVID-19 pandemic has caused public-health and economic issues to countries around the globe, and the…
Making the Journey to the Intelligent SOC
AI, Machine Learning, and Open-XDR Make it Easier By Albert Zhichun Li, Chief Scientist, Stellar Cyber Most enterprises and service providers are building security operations centers (SOCs) where a team…
Telegram for Business Communications: Understanding The Risks And Rewards
By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted…
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of…
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site…
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece,…
Magecart May Make Holidays Less Merry
Third-party plug-ins driving most retail sites can open doors to attackers by Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks In the unprecedented year of 2020, the rise…
Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase…
Automated Pentesting – Ready to Replace Humans?
Is Automation the end of human pentesting? By Alex Haynes, CISO, CDL In the past few years, automation in many spheres of Cybersecurity has increased dramatically, but pentesting has remained…
Perfecting Your Cybersecurity Sales Process
By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck,…
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people…
3 Educational Cyber Security Steps for The Protection of Your Personal Data
By Ankit Rajpurohit Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen…