Hybrid Offenses as a Current Security Concern
By Milica D. Djekic When we say an offense we would mean any kind of criminality being a transnational crime, human trafficking or act of terrorism. In its essence, any…
September Patch Tuesday
Updates are Light, But Ransomware Attacks Escalate By Chris Goettl, Director of Product Management, Security, Ivanti September marks the second month in a row with a relatively light set of…
Cloud Security Essentials — Session Monitoring
By Morey Haber, CTO & CISO, BeyondTrust The near-perfect personal attack vector is “shoulder surfing.” If you are not familiar with the concept, it is literally a threat actor looking…
Speculative Execution and SWAPGS
A Match Made In Heaven for Motivated Threat Actors By Filip Truta, Information Security Analyst, Bitdefender What if cybercriminals could deploy an attack that is both devastating and impossible to…
Hidden and High Priority Threats
Understanding Destructive Objects By Tyson Whitten, Vice President of Global Marketing, ReversingLabs Are you confident in what you saw today? It’s a simple, yet important question that nobody in security…
Flexibility in Vulnerability Management: Why it’s Essential
By Jim Souders, Chief Executive Officer, Adaptiva Eighty percent of cyberattacks happen at the endpoint today. When you consider that cybercrime is projected to cost $6 trillion annually by 2021,…
Hacking the projector at a cyber event
By Milica D. Djekic You would probably be present or hear about some cybersecurity events where some of the attendees hacked the conference projector using a mobile device. Such a…
Why Cyber Security is Redefining SMEs’ Business Operations on the Cloud
By Mufassira Fathima, Content Writer, Allied Analytics LLP Modern-day IT infrastructures and data centers are revolutionized by the advent of technology and cloud-based services. The emergence of the cloud, as…
Cyber Security and the Supply Chain: Strengthening the Weak Links
By Simon Taylor, VP Product at Glasswall Solutions In today’s cybersecurity climate, with high-profile hacks and data breaches constantly in the headlines, businesses are putting more effort than ever into…
The challenges of the good incident response strategies
By Milica D. Djekic The incident response (IR) is one of the key challenges to a modern cyber defense. Practically, it would include three crucially important steps being (1) preparation,…
How Vulnerable Are You?
By Bill Graham, Technical Marketing Specialist, GrammaTech Introduction The promise of static analysis is compelling but our most frequently asked question is, “Where do we start?” Security is a top-of-mind…
How to survive the cybersecurity expertise shortfall
By François Amigorena, CEO, IS Decisions Analysts everywhere are fretting about the lack of cybersecurity professionals across the world. The Cybersecurity Jobs Report believes the global shortfall of cybersecurity workers…