Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of…
How to Maintain Anonymity in Communications?
By Milica D. Djekic The kids would love to play the games. They would not be attracted to the computer’s games only, but rather with some being so creative, engaging,…
How to Combat Cybersecurity Attacks & Cyber Warfare
By Adnan Olia, Chief Operating Officer and Co-owner of Intradyn It’s no secret that cybersecurity attacks and cyber warfares are real challenges and threats to the safety of individuals, businesses,…
Managing Small Business Cybersecurity During Covid-19
By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote…
In 2020, SOCs Are Understaffed Yet Overconfident in Ability to Detect Cyberthreats
Exabeam’s ‘2020 State of the SOC Report’ offers peer-to-peer SOC comparisons By Steve Moore, chief security strategist, and Samantha Humphries, senior product marketing manager, Exabeam Security operations centers (SOCs) are…
Cyber Attacks at Sea: Blinding Warships.
Are GPS completely vulnerable to cyberattacks? By Julien Chesaux, Cyber Security Consultant, Kudelski Security Who Controls the Sea, Controls the World The annual multilateral exercise between the U.S. and the…
Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure
Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the…
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just…
How Pizza Can Be the Recipe to Understand Cloud Security
By Yohanan Berros, Customer Operation Managers, XM Cyber It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises…
Economic Efficiency in Cyber Defense
By Mark Evans, VP Marketing, Endace The previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series…
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success…
Not All Secure Certificates Created Equal
By Cal Evans, Developer and SiteGround Ambassador Data security is essential for every person who uses the Internet, but if you have your own site, the stakes are even higher….