Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance
Financial Institutions Should Boost Their Efforts to Thwart Cyberattacks By Bob Thibodeaux, Chief Information Security Officer, DefenseStorm Consumer data is one of the most valuable assets for organizations around the…
Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry
Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & Chiyi Lin, product line manager TXOne Networks Until about ten years ago,…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted…
Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?
By Raj Dodhiawala, President, Remediant Lateral movement using compromised admin credentials is integral to almost all ransomware and malware attacks today. Specifically exploiting privilege sprawl—or the always-on, always-available administrative access…
Redefining Resilience in The New World of Work
By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic has accelerated the move towards hybrid and remote working which was already…
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement…
How to Fix Mid-Market Security Using Intelligent Automation and AI
By Guy Moskowitz, CEO, Coro Market forces are working against medium-sized businesses, leaving companies that don’t have large, dedicated security teams and fat cyber security budgets exposed to cyber threats….
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace. Businesses are conducting…
Biggest Cyber Trend in 2022
You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: a customer is working late at night, has been a long day,…
How To Defend Railway Subsystems from Targeted Cyber-Attacks
By Michael Cheng, Director at TXOne Networks & C. Max. Farrell, Senior Technical Marketing Specialist at TXOne Networks Railways are a critical part of every nation’s vital system. Maintaining the…
Are You Prepared for the New Normal of Jekyll and Hyde Data?
An organization’s data and secrets are simultaneously its greatest assets and its greatest risks. By Howard Ting, CEO, Cyberhaven Recently Twitch suffered a devastating hack that exposed its most sensitive…
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept to cybersecurity professionals – and hackers. According to a recent study, phishing attacks are…