3 Cybersecurity Certainties for 2022
By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency…
Have We Learned from Our Past Mistakes to Prevent Future Cyberattacks?
By Marc Packler, President, CISO Advisory, Silent Quadrant Gartner’s article, “The Top Cybersecurity Predictions for 2021-2022,” contains a quote from philosopher George Santayana: “Those who cannot remember the past are…
Don’t Become a Horrible Headline: Some Tips on Redesigning Your Threat Posture for The 2022 Threat Landscape
By Omar Zarabi, Founder and CEO, Port53 Technologies As in previous years, the DefCon of the cybersecurity industry is best illustrated by the headlines – each a cautionary tale. The…
Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by the End of Q3 2021
By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat actors are not far behind as they target users with increasingly sophisticated and complex…
Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies continue to skyrocket, organisations are at constant risk. There are many recent…
Data Security Must Be a Priority as Employees Quit in Record Numbers
By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5…
Cyber Insurance: What Executives Need to Know Before Obtaining Coverage
By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by…
Combining True MDR & SOC for Robust Cybersecurity
By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the cyberthreat landscape is that it is ever evolving. Amid a global pandemic,…
Killware is the Next Big Cybersecurity Threat
By Brian Erickson, Vice President or Strategy and Solutions and retired U.S. Navy Captain, Vidoori Today’s battlefield has expanded to a digital landscape, and the impact affects the general population…
How Do I Reliably Identify You If I Cannot See You?
eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a process used around the globe for many years to validate the identity…
How to Protect All Five Stages of the IoT Security Lifecycle
Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate…
WatchGuard Technologies’ 2022 Predictions: State-Sponsored Mobile Threats, Space-Related Hacks and More
A look at the future of cybersecurity in 2022 and beyond By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies 2021 was another wild year in cybersecurity with the industry facing…