Gold Optis: Most Innovative and Socially Conscious Technologies at Black Hat
By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as…
Silver Optis: Innovative and Socially Conscious Technologies at Black Hat
By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as…
Embed Security into Your Modernized Applications
By Gadi Naor, CTO and Co-Founder of Alcide Companies may be feeling pressure to modernize their legacy, monolithic applications for many reasons: some may wish to operate on a larger…
Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G
By Amr Alashaal, Regional Vice President – Middle East at A10 Networks Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons,…
New analysis of Diavol ransomware reinforces the link to TrickBot gang
Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind the TrickBot botnet. In July, researchers from Fortinet reported that…
What is the Main Goal of Penetration Testing?
By Glenn Mabry, Senior Instructor / Tech Researcher for Legends of Tech Digital security is one of the top priorities for today’s business world. The internet has enabled businesses to…
UNC215, an alleged China-linked APT group targets Israel orgs
China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran. A China-linked cyber-espionage group has…
Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?
By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and…
Is The Cloud Leaving You Exposed?
Exploring the public cloud and addressing its unanticipated security challenges By Chuck Slate, Lead Architect, Attivo Networks, Inc. On a traditional network, user accounts are the main identity type and,…
Threat actors leaked data stolen from EA, including FIFA code
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure of the negotiation with the victim. In June, hackers have…
No, You Don’t Need
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To…
Cloud Security Automation: The Fastest Path to Zero Trust
By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and…