Securing Digital Identities in A Predominantly Remote World
COVID-19 and the subsequent uptick in targeted cyberattacks accelerate the need for biometric-based digital onboarding By Bob Eckel, President & CEO, Aware, Inc. As we entered 2020, organizations were beginning…
Telegram for Business Communications: Understanding The Risks And Rewards
By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted…
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece,…
For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge
By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively…
Patched Minimizes Risk – But Opens the Door for Compatibility Problems
How to Remediate Federal Systems with Zerologon Vulnerability By Egon Rinderer, Global Vice President of Technology & Federal CTO, Tanium In September, the Cybersecurity and Infrastructure Security Agency (CISA) released…
Cyber-Attacks Are the New Norm and Ransomware Is on The Rise
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G,…
COVID Impact on MSSPs
By Tristan Hinsley, Cybersecurity Expert, TDI Security Given the remote nature of most Managed Security Service Providers’ (MSSPs) business operations, most would imagine they would be well-positioned to deal with…
Cybersecurity Challenges When Working from Home
By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in…
CRYPTO
An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated…
Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of…
How To Fight A Virus: Lessons From Cybersecurity
By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as…
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to…