Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it…
Election Integrity Is A Moving Target, But It’s Essential to Pursue
Measures to improve voting security need to start long before election day itself By Craig Hinkley, Chief Executive Officer, WhiteHat Security, a wholly-owned, independent subsidiary of NTT Ltd. U.S….
Mapping Automation to the MITRE ATT&CK Framework
By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative, both…
Are the Worst Cryptocurrency Security Breaches Behind Us?
By Tim Fries, Co-Founder, The Tokenist You would be right in assuming that blockchain itself was never hacked, but that doesn’t mean people don’t like to give up security features…
Ransomware, Risk, And Recovery
Why You Need to Take A Hard Look At Your Corporate Recovery Plan By Mickey Bresman, CEO, Semperis What we as IT and security professionals worry about when planning…
Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of…
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success…
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can…
How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred…
Cybercriminals Exploit Coronavirus with Wave of New Scams
By David Ruiz, Malwarebytes Labs With no vaccine yet developed, and with much of the world undergoing intense social distancing measures and near-total lockdown procedures, threat actors are…
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources…
The Secret to Winning IT Security Roulette
By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino where the longer you stay, the more likely…