Security in Orbit: Addressing the Current State of Satellite Security
By Geoff Pierce, Chief Information Security Officer, Centauri With 5G finally starting to roll out across the country, the anticipation for new IoT applications continues to build. With that anticipation…
The Malware Research Insights
By Milica D. Djekic The malware by itself is any piece of malicious code that is capable to cause damage to the current IT configuration. The malicious applications could function…
Going Beyond Compliance: What New Regulations Mean For Your Company
Cyber Defense Magazine By Zack Schuler, founder, and CEO of NINJIO How many times have you shared a piece of personal information online over the past year? If you’re adding…
Flexibility in Vulnerability Management: Why it’s Essential
By Jim Souders, Chief Executive Officer, Adaptiva Eighty percent of cyberattacks happen at the endpoint today. When you consider that cybercrime is projected to cost $6 trillion annually by 2021,…
Cyber Security and the Supply Chain: Strengthening the Weak Links
By Simon Taylor, VP Product at Glasswall Solutions In today’s cybersecurity climate, with high-profile hacks and data breaches constantly in the headlines, businesses are putting more effort than ever into…
Tips to Help Boost the Security of Your MySQL Database
By Sujain Thomas, Security of Your MySQL Database, Remote DBA If you have been keen on database security news, you may have heard of the attacks on MySQL databases. The…
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from…
PART II: DEFENDING YOUR AIRSPACE
WIPS vs. WIDS By Ryan Orsi, Director Product Management, WatchGuard Technologies In part one of this series: The Anatomy of a Wi-Fi Hacker, we addressed the ever-growing need for a…
The challenges of an Internet of Things analytics
By Milica D. Djekic Through a history – we would notice the importance of good analytics in many areas of human activities. For instance, many military strategists would deal with…
Addressing the government data security problem
By Marcelo Delima, Global Product Marketing Manager at HPE Security – Data Security Throughout federal, state, and local governments, the digital revolution is driving exponential growth of high-value data. Personally…
Ways to Protect Sensitive Data Online
By Ebbe Kernel, data mining researcher & writer The world has witnessed a number of high-profile data breaches over the last couple of decades. While the impact of these breaches…
Conversation Marketing Security Pitfalls and Best Practices
By Morey Haber, CTO & CISO, BeyondTrust According to Gartner’s recent ‘AI and ML Development Strategies’ study, 40% of organizations cite customer experience (CX) as the number one motivator for…