Security in The New Normal Requires an Agile Approach
By Danny Presten, Chief Methodologist at Digital.ai Phishing attacks are up 600%, ransomware attacks have increased 148%, and the FBI has reported a 300% increase in cybercrimes. Cybercriminals are stepping…
CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find and Route These “Below the Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPNs, RDP, VNC, Citrix, and others, have always been…
Can We Better Leverage Our – Already Scarce – Cyber Security Human Resources?
By Douglas Ferguson, Founder & CTO, Pharos Security It is accepted that there is a significant cybersecurity skills deficit. The result, it is argued, is that cybersecurity teams do not…
Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce
By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential…
WireGuard – Separating Fact from Fiction
By Tomislav Čohar, co-founder, hide.me VPN Offering high speeds, excellent levels of security and a low footprint, WireGuard has rightly caused ripples within the VPN industry. WireGuard is an open-source…
Is What’s Lurking in Your Network About to Come Out?
The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. By Carolyn Crandall, Chief Deception Officer, Attivo Networks The COVID-19 pandemic has forced countless…
Security by Design: How to Protect the Future of Business
By Jim Zuffoletti, CEO & co-founder of SafeGuard Cyber Estimates suggest that by 2021, cybercrime will cost the world $6 trillion every year. This will constitute “the greatest transfer of…
CRYPTO
An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated…
A Passwordless Future: Will Biometric Identification Replace Passwords?
By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It…
Organizations: It’s Time to Rethink How You Protect Environments from Within
By Richard Melick, senior technical product manager, Automox Many of us have made the shift to virtual with our work, school, and social lives, as we all aim to protect…
Cyber Attacks at Sea: Blinding Warships.
Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the…
Cyber Crimes Will Increase with Shift to Teleworking
By Andy Sauer, Director of Cybersecurity, Steel Root With the sudden shift to work-from-home operations, businesses are now forced to deal with increased activity from both independent and nation-state cybercriminals….