5 Ways to Avoid Security Automation Pitfalls
By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to boost threat detection and response….
Media Content Captured on Mobile Is Driving Compliance Problems
Photos, Videos, and Other Multi-Media Content Captured by Employees Are Easily Shared and Rarely Governed By Josh Bohls, CEO, Inkscreen Recent headlines are once again demonstrating the consequences of employees’…
Funding Schemes and Cyber Security
By Milica D. Djekic What a lovely day; you are just searching your web for some online business opportunities or you are reviewing the cyberspace to get the stipend for…
Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy
By Joanne Godfrey, Security Evangelist, ZeroNorth Companies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But…
Unstructured Data, Unsecured Data
The Data You Overlook Needs Protection Too By Deborah Kish, EVP, Marketing & Research, Fasoo, Inc. Sensitive unstructured data is everywhere, it means different things to different businesses and comes…
Cyber Warfare and Its Impact on Businesses
By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments and the public have all witnessed unprecedented growth in the digital economy. From the design of…
Low Latency Encryption Will Secure the U.S. Electrical Grid
By John Downing, President, Encrypted Grid, LLC The electric power grid is the backbone of America, generating and transmitting the energy to empower all sectors of our economy. Reliance on…
Smart Gadgets in Proving Workplace Violence
By Milica D. Djekic The violence at the workplace could start as the common insult, continue as the verbal abuse and end up as the mobbing attack that could get…
Why Academic Openness and A Rise in Online Classes Should Invoke A Renewed Focus on Security
By Anthony Bettini, CTO, WhiteHat Security For decades, researchers and students from around the world have come to study and collaborate, research, and innovate at American universities and colleges under…
Looks Like Russian Hackers Are on An Email Scam Spree
By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email…
4 Simple Ways to Repel Ransomware as The Rise in Remote Work Continues
By Kris Lahiri, Co-founder and Chief Security Officer of Egnyte Ransomware attacks are now the most common security incident taking place today. According to a recent report from TrustWave, ransomware…
Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce
By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential…