Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem
Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding emerging trends, and innovation breakthroughs. The annual AT&T Cybersecurity Insights(TM)…
Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas
Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event…
An Internet of Things Future Means Securing Entire Supply-Chains
By Nils Gerhardt, Chief Technology Officer for Utimaco The ‘Internet of Things’ (or IoT) is far more than smart speakers and app-connected lightbulbs: in less than a decade it has…
Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to be fought on two fronts – on the ground and in the ether –…
The Seven Deadly Sins of Blockchain Security
By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology (DLT) is essentially an improved method of record-keeping, one which achieves a consensus shared…
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat Landscape You can’t ignore the headlines. From the Irish health service to…
Log4j Showed Us That Public Disclosure Still Helps Attackers.
Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25 pm on the 9th of December an infamous (now deleted) tweet linking a 0-day…
Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance
Financial Institutions Should Boost Their Efforts to Thwart Cyberattacks By Bob Thibodeaux, Chief Information Security Officer, DefenseStorm Consumer data is one of the most valuable assets for organizations around the…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted…
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace. Businesses are conducting…
Are You Prepared for the New Normal of Jekyll and Hyde Data?
An organization’s data and secrets are simultaneously its greatest assets and its greatest risks. By Howard Ting, CEO, Cyberhaven Recently Twitch suffered a devastating hack that exposed its most sensitive…
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept to cybersecurity professionals – and hackers. According to a recent study, phishing attacks are…