DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both…
Benefits of Conducting Crown Jewels Analysis
The main goal is to identify mission-critical cyber assets, but there are additional benefits… By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. Crown Jewels Analysis is a MITRE methodology…
Crowdsourced Security and the Gig Economy
Alive and well in the worst way By Alex Haynes, CISO, CDL Let’s pretend you have offensive security skills and you want to use them for gainful employment. You attend…
Why You Should Use a VPN When Working With Cryptocurrencies?
Due to the increase in the hacking of Cryptocurrencies, it’s necessary for crypto users to use encryption tools. By Susan Alexandra, Contributing Writer, None It’s been two years since cryptocurrency…
How Consumers Can Protect Their Identity after a Data Breach
Steps to safeguard personal information in a vulnerable cyber-space. By Paige Schaffer, CEO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit In an age where large retailers,…
Employers Catch One-Year Break on Impending California Privacy Law
By Usama Kahf, Partner, Fisher Phillips Thanks to recent negotiations among state lawmakers, it appears that California employers may get a temporary reprieve on some of the more sweeping data…
Speculative Execution and SWAPGS
A Match Made In Heaven for Motivated Threat Actors By Filip Truta, Information Security Analyst, Bitdefender What if cybercriminals could deploy an attack that is both devastating and impossible to…
Flexibility in Vulnerability Management: Why it’s Essential
By Jim Souders, Chief Executive Officer, Adaptiva Eighty percent of cyberattacks happen at the endpoint today. When you consider that cybercrime is projected to cost $6 trillion annually by 2021,…
Hacking the projector at a cyber event
By Milica D. Djekic You would probably be present or hear about some cybersecurity events where some of the attendees hacked the conference projector using a mobile device. Such a…
Why Cyber Security is Redefining SMEs’ Business Operations on the Cloud
By Mufassira Fathima, Content Writer, Allied Analytics LLP Modern-day IT infrastructures and data centers are revolutionized by the advent of technology and cloud-based services. The emergence of the cloud, as…
Cyber Security and the Supply Chain: Strengthening the Weak Links
By Simon Taylor, VP Product at Glasswall Solutions In today’s cybersecurity climate, with high-profile hacks and data breaches constantly in the headlines, businesses are putting more effort than ever into…
Addressing the Growing Risk of Personal File-Sharing Apps at Work
By Mika Javanainen, Senior Director of Product Management, M-Files Corporation Thousands of employees around the world are inadvertently putting their organizations at risk by using personal file-sharing apps such as…