Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts,…
Avoiding Misinformation for Content Moderators
By Sarah Katz, Cyber Security Specialist Provided the controversy surrounding foreign fake news that allegedly influenced the 2016 presidential elections in countries such as France and the United States, concern…
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that…
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from…
Where Property Insurance Ends and Cyber Insurance Begins—the Industry’s Biggest Issue More People Should Be Talking About
By Matt Prevost, Senior Vice President, Cyber Product Manager at Chubb Cyber-attacks are expected to cost companies more than $2 trillion in 2019, according to Juniper Research. Consequently, many companies—especially…
From Guards to Detectives: Evolving the Junior Security Analyst Role
By Mike Armistead, CEO and Co-Founder, Respond Software Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human roles with the support of intelligent…
Detrimental Ransomware Effects
Lost coursework and headaches By Charles Parker, II Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828 students, aged between 11…
Achieving Cybersecurity Readiness with AI-Powered, Gamified Training
By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence “THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems…
Improving Quality And Security With Binary Analysis
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction: Companies serious about quality, safety, and security need to manage the risks in their supply chain, including software such as commercial of…
The packet analysis as a helpful way of network monitoring
By Milica D. Djekic The internet packets are the sets of information being created and transmitted to carry on a message through the network’s communications. These packets may consist of…
Layered Security
Two locks are better than one By David Share, Director, Amazing Support Imagine you had a million dollars (or pounds). Heck, let’s go crazy and say you have a billion…
How Can You Tell If Your WordPress Site Has Been Hacked?
WordPress is the foundation of a large chunk of the web, which makes it an obvious target for criminals and hackers. If attackers find a vulnerability in WordPress, they have…