Why Now Is the Time to Prepare for The Quantum Threat
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start preparations for the quantum threat today? By Ali El Kaafarani, CEO &…
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat Landscape You can’t ignore the headlines. From the Irish health service to…
4 Ways to Improve Azure Active Directory Security
Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis Cloud-led innovation has accelerated the digital transformation of many organizations that have…
Three Ways IP Data Enhances Cyber Security
By Jonathan Tomek, VP of Research and Development, Digital Envoy Cyber security professionals were never worry-free; there are simply too many nefarious players who have much to gain by hacking…
Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now
There is little doubt that continued effort at all levels across infrastructure and government is required to ensure the resilience required is in place By Ben Lane, Events Manager, Torch…
Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance
Financial Institutions Should Boost Their Efforts to Thwart Cyberattacks By Bob Thibodeaux, Chief Information Security Officer, DefenseStorm Consumer data is one of the most valuable assets for organizations around the…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted…
Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?
By Raj Dodhiawala, President, Remediant Lateral movement using compromised admin credentials is integral to almost all ransomware and malware attacks today. Specifically exploiting privilege sprawl—or the always-on, always-available administrative access…
Redefining Resilience in The New World of Work
By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic has accelerated the move towards hybrid and remote working which was already…
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace. Businesses are conducting…
Biggest Cyber Trend in 2022
You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: a customer is working late at night, has been a long day,…
How To Defend Railway Subsystems from Targeted Cyber-Attacks
By Michael Cheng, Director at TXOne Networks & C. Max. Farrell, Senior Technical Marketing Specialist at TXOne Networks Railways are a critical part of every nation’s vital system. Maintaining the…