Gold Optis: Most Innovative and Socially Conscious Technologies at Black Hat
By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as…
U.S. State Department was recently hit by a cyber attack
The U.S. State Department was recently hit by a cyber attack, the Department of Defense Cyber Command might have suffered a serious breach. The U.S. State Department was recently hit…
Looking Back at Executive Order on Cybersecurity and What it Means for Your Business
By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives to accomplish several important objectives for the United States’ approach to safeguarding its data and…
Silver Optis: Innovative and Socially Conscious Technologies at Black Hat
By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as…
Looking Back at Executive Order on Cybersecurity and What it Means for Your Business
By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives to accomplish several important objectives for the United States’ approach to safeguarding its data and systems….
T-Mobile data breach could be worse than initially thought, 54 million customers impacted
T-Mobile data breach could be worse than initially thought, an update to the investigation reveals that over 54 million individuals were impacted. T-Mobile data breach could be worse than initially…
Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G
By Amr Alashaal, Regional Vice President – Middle East at A10 Networks Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons,…
Evaluating Security Practices in Response to Colonial Pipeline And South Korean KAERI Attacks
Zero Trust and Enforcing the Principle of Least Privilege Have Become Crucially Important. By Garret Grajek, CEO, YouAttest In recent news, we have seen several high-profile attacks on major institutions…
How Cyber Insurance Can Protect Your Business from Breach of Privacy Claims
By Irena Ducic, Growth Marketer, Embroker Article text: Every company that stores and handles sensitive customer, partner, or vendor information has the responsibility to protect that data from a variety…
New analysis of Diavol ransomware reinforces the link to TrickBot gang
Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind the TrickBot botnet. In July, researchers from Fortinet reported that…
Identity Matching: What You Need to Know About It
When asked how they can improve a bank’s security from financial crime, many bankers are at a loss for words. Granted, the question is a broad one and difficult to…
UNC215, an alleged China-linked APT group targets Israel orgs
China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran. A China-linked cyber-espionage group has…