Halting Hackers on the Holidays: Protecting Yourself from Seasonal Cyber Threats
by Gary S. Miliefsky, CISSP, fmDHS Ho-ho-hold on to your data! 🎅 The holiday season is here, bringing cheer, gifts, and…cybercriminals?! That’s right! While you’re decking the halls, hackers are…
Smart Traffic Signals Security in the Era of AI and Smart Cars
Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once a simple concept with red, yellow, and green bulbs, traffic…
Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs
CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform…
An Internet of Things Future Means Securing Entire Supply-Chains
By Nils Gerhardt, Chief Technology Officer for Utimaco The ‘Internet of Things’ (or IoT) is far more than smart speakers and app-connected lightbulbs: in less than a decade it has…
Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to be fought on two fronts – on the ground and in the ether –…
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat Landscape You can’t ignore the headlines. From the Irish health service to…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted…
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to the cybersecurity industry By Bryon Kroger, Founder of Rise8 Following the…
How to strengthen cyber resilience with Unified BCDR
By Joe Noonan, General Manager, Unitrends and Spanning Cybercrime and hybrid work environments prompted by the pandemic have significantly impacted the way organizations protect and store their data. Data is…
Have We Learned from Our Past Mistakes to Prevent Future Cyberattacks?
By Marc Packler, President, CISO Advisory, Silent Quadrant Gartner’s article, “The Top Cybersecurity Predictions for 2021-2022,” contains a quote from philosopher George Santayana: “Those who cannot remember the past are…
Don’t Become a Horrible Headline: Some Tips on Redesigning Your Threat Posture for The 2022 Threat Landscape
By Omar Zarabi, Founder and CEO, Port53 Technologies As in previous years, the DefCon of the cybersecurity industry is best illustrated by the headlines – each a cautionary tale. The…
Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by the End of Q3 2021
By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat actors are not far behind as they target users with increasingly sophisticated and complex…