EU leaders aim at boosting defense and security, including cybersecurity
During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security. During the recent video conference of the…
Operation NightScout: supply chain attack on NoxPlayer Android emulator
Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and Macs. UPDATE (February 18, 2021): Following the publication of our…
How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night
Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a…
Centrify Study Lifts the Hood on Cybersecurity Policy and Threat Challenges During COVID-19
Recent study shows increased breaches in cybersecurity led nearly 40% of UK business decision makers to dismiss staff members since the start of the pandemic By Andy Heather, VP and…
Acronis Cyber Readiness Report
Pandemic reveals cybersecurity gaps, need for new solutions By Peter Hale, Sr. Content Manager, Acronis As businesses around the world reacted to the COVID-19 pandemic, many had to address new…
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract…
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes…
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on…
Why Are Fully Staffed Cybersecurity Teams Unable to Keep Up with Hacks?
By Steve Salinas, Head of Product Marketing, Deep Instinct Faced with mounting cyber threats, large enterprises are devoting more resources than ever to improving their cybersecurity posture. According to a…
Can We Better Leverage Our – Already Scarce – Cyber Security Human Resources?
By Douglas Ferguson, Founder & CTO, Pharos Security It is accepted that there is a significant cybersecurity skills deficit. The result, it is argued, is that cybersecurity teams do not…
Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce
By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential…
Is What’s Lurking in Your Network About to Come Out?
The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. By Carolyn Crandall, Chief Deception Officer, Attivo Networks The COVID-19 pandemic has forced countless…