Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems
By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for years. These attacks are particularly concerning because they pose a real threat…
Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs
China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group is a China-linked cyber espionage group that has…
IT Security in Organizations After the Pandemic: What’s Next?
By Alan Kakareka, InfoSec consultant to businesses, Demyo inc. The year 2020 has so far represented, the biggest change in the way we live and interact with our environment. After…
REvil ransomware gang hacked Acer and is demanding a $50 million ransom
Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang…
Security and Remote Management: What Is the Market Looking Like as We Head Towards 2021?
By Gil Pekelamn, CEO, Atera For many IT professionals and managed service providers (MSPs), remote management has always been part of the deal. Especially in this generation’s global economy, service…
Mitigating the Pitfalls of Onedrive Security
By Veniamin Simonov, Director of Product Management, at NAKIVO Inc. With COVID-19 triggering a potential long-term shift to working from home, SecOps teams are coming under increasing pressure to keep…
Cyber Warfare and Its Impact on Businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments and the public have all witnessed unprecedented growth in the digital economy. From the design of…
HIPAA Compliance and The Protection of Cyber Security
By Andrew Mikhailov, CTO at Zfort Group Businesses face the risk of severe cyber-attacks – the present-day cyberspace criminals are well-organized, thoughtful, and marketable. And one of the most sensitive…
Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud
By Robert Prigge, CEO of Jumio Passwords will become extinct much faster than predicted. As the COVID-19 pandemic pushed more of us to self-isolate, Zoom became the go-to teleconferencing platform….
Post COVID-19: Cloud, Remote Work and BYOD Security Predictions
By Anurag Kahol, CTO and co-founder, Bitglass Cloud adoption has already been growing rapidly, but we’ll see a sharp increase in adoption in 2020 as a result of the global…
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to…