Cybercriminals Exploit Coronavirus with Wave of New Scams
By David Ruiz, Malwarebytes Labs With no vaccine yet developed, and with much of the world undergoing intense social distancing measures and near-total lockdown procedures, threat actors are…
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just…
The Gap in Security – Data Centric Security
By Eric Rickard, CEO, Sertainty Federal Systems What do the Coronavirus pandemic, 9/11 terrorist attacks, Boeing 737 MAX crashes, and the OPM data breach have in common? First, their root…
Drowning in A Sea of Threat Data? Consider A Curator
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the wake of increasing cybersecurity threats and data breaches, a whole host of network monitoring and threat intelligence…
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources…
Devops – Are You Risking Security for Agility?
By Morey Haber, CTO & CISO, BeyondTrust By merging software development and IT operations ― two traditionally mutually exclusive functions ― DevOps has fundamentally transformed how today’s organizations develop, operate…
Mastering Automation to Solve Data Security for Healthcare Practices
If the Biggest Organizations Can’t Keep Our Data Safe, Then How Can a Small One? By Anne Genge, CEO, Alexio Corporation One of the greatest challenges of 21st-century is cyber-security….
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information…
Protect Yourself from Threats and Fraud With XTN
By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. We also…
Threat Modeling High Value Assets
By M. Michael Mitama, THETA432 We live in an era where we are continuously bombarded with marketing campaigns of the next silver-bullet that will stop “The Threat”. Overcompensation on malware…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly…
CASB+Is Essential Infrastructure for The Cloud Mobile Digital Transformation
By Salah, VP of Marketing at CipherCloud The ongoing cloud mobile digital transformation has brought cloud access security brokers (CASB+) front and center as an important part of enterprise cloud…