5 Steps to Ensure Iot Security Amidst CMMC Compliance
By Mike Raymond, Federal Sales Manager, Ordr Cyber threats against the U.S. and the Department of Defense (DoD) are very real, and efforts related to the department’s Cybersecurity Maturity Model…
FIRST launches new code of ethics for incident response and security teams on Global Ethics Day
By Shawn Richardson, Ethics SIG co-Chairs of FIRST. October 21, 2020 – following a global consultation, the Forum of Incident Response and Security Teams (FIRST) is launching new ethics guidelines…
3 Steps to Reimagine Your AppSec Program
By Jake Reynolds, Product Manager at NetSPI and Nabil Hannan, Managing Director at NetSPI With Continuous Integration/Continuous Deployment (CI/CD) increasingly becoming the backbone of the modern DevOps environment, it’s more…
Building Trust: The Path to True Security Synergy Between Appsec And Developers
By Matias Madou, co-founder and CTO, Secure Code Warrior A relationship that is built on the shaky foundations of mistrust is, well, best approached with low expectations. Sadly, this can…
Years of Iot Hacking, But What Have We Actually Learned?
By Brad Ree, CTO, ioXt Alliance Since the inception of the Internet of Things (IoT) in 1999, connected devices have been integrated into nearly every industry, from retail to automotive…
Cyber-Attacks Are the New Norm and Ransomware Is on The Rise
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G,…
The Four Insights Network Metadata Can Reveal About Your Compromise Level
Why Network Metadata is an Underappreciated and Undervalued Threat Intelligence Resource By Ricardo Villadiego, CEO of Lumu Modern security teams are not unlike the tenacious forensic investigators featured on many…
COVID Impact on MSSPs
By Tristan Hinsley, Cybersecurity Expert, TDI Security Given the remote nature of most Managed Security Service Providers’ (MSSPs) business operations, most would imagine they would be well-positioned to deal with…
Centrify Study Lifts the Hood on Cybersecurity Policy and Threat Challenges During COVID-19
Recent study shows increased breaches in cybersecurity led nearly 40% of UK business decision makers to dismiss staff members since the start of the pandemic By Andy Heather, VP and…
Election Integrity Is A Moving Target, But It’s Essential to Pursue
Measures to improve voting security need to start long before election day itself By Craig Hinkley, Chief Executive Officer, WhiteHat Security, a wholly-owned, independent subsidiary of NTT Ltd. U.S….
Mapping Automation to the MITRE ATT&CK Framework
By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative, both…
Manual vs. Automatic Cybersecurity Testing: What’s the Difference?
By Tamir Shriki, Customer Operations Manager, XM Cyber In the context of cybersecurity, if you want to protect something, you need the ability to test its defenses. It’s the only…