One Year on From Whatsapp Hack- What’s Changed?
In 2019, WhatsApp was hacked using sophisticated NSO spyware, Pegasus, used to spy on iOS WhatsApp users’ phones. By Nicole Allen, Marketing Executive, SaltDNA One year on from WhatsApp Hack…
Cyber Liability Insurance – Safe Bet or Sales Gimmick?
By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we see more stories about companies overtaken by this type of cyberattack. Garmin and Canon,…
Privacy Shield Revoked
What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies On July 16th, the European Court of Justice (ECJ) struck down the EU-US data…
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on…
Build Your AI Incident Response Plan… Before It’s Too Late
By Patrick Hall* and Andrew Burt** * Patrick Hall is a principal scientist at bnh.ai, a boutique law firm focused on AI and analytics, and an adjunct professor in the…
The Future of Security – Predictions Post COVID-19
By Mike Riemer, Pulse Secure, Global Chief Security Architect The Future of Work post COVID-19 – Larger Remote Workforce with Cybersecurity Built into the Culture “A recent Gartner survey of…
Should We Be Worried About Vehicle Hacking?
And what can we do about it? By Martin Banks With more connected devices than ever, cybersecurity is a more prominent issue today than ever before. You’ll see articles and…
The Race to Pivot Around Remote Work and The Emergence Of SASE
By Amit Bareket, CEO and Co-Founder of Perimeter 81 When Kodak completely neglected the rise of digital photography (an idea that Kodak itself invented) and then continued to willfully drive…
Cyber Crimes Will Increase with Shift to Teleworking
By Andy Sauer, Director of Cybersecurity, Steel Root With the sudden shift to work-from-home operations, businesses are now forced to deal with increased activity from both independent and nation-state cybercriminals….
Cybersecurity Education and Practice: Never Stop Learning
By Ken Sigler, Dan Shoemaker, and Anne Kohnke As the number of industries, organizations, and educational institutions continue to recognize the scope and impact of cybersecurity, the means in which…
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just…
How To Manage Your Small Business In Time Of Crisis
By Milica D. Djekic It’s always a challenge to manage your small business, but especially in times of crisis. Such a situation requires special skills, such as crisis management skills,…