Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis…
Securing the Hybrid Cloud: What Skills Do You Need?
By Raj Samani, chief technology officer, EMEA, Intel Security Group Hybrid cloud models offer many well-documented benefits, but they also introduce more complexity for securing data and applications across the…
How to protect an enterprise from physical attacks
By Yana Yelina, Tech Journalist, EffectiveSoft Nowadays, none of the enterprises is immune to cyberattacks, data breaches, malware, and other types of damage. As a result, news about information leakage…
Threat intelligence collection in a developing world
By Milica D. Djekic As it’s known – threat intelligence collection is mainly increasing in developing countries. These countries could be a source of the real risks, threats, and challenges…
Mission Critical Security and the Rise of the Private Internet of Things
By Stewart Kantor, CFO/President, Ondas Networks We live in a world where constant data connectivity has become the standard, allowing us to access information from any number of devices operating…
Are your critical systems lying to you? Protecting SCADA Systems from Data Forgery
By Michael Shalyt, VP Product Aperio Systems (www.aperio-systems.com) Like many things in life, the greatest cyber threat to critical infrastructure is in the things we cannot see. Both security analysts…
The anniversary of EMV roll-out: criminals are anxious to beat the system
By Andrei Barysevich Introduced by the financial industry in the early 2000s, EMV smart payment cards have largely supplanted magnetic stripe technology, and for good reason. Due to concerns surrounding…
The independent wireless networks
By Milica D. Djekic The wireless technologies would actively attract the researcher’s attention during the last few decades. The era of wireless information transfer has begun around two centuries ago…
2 Sure Ways To Prevent Cyber Crime
By Laban Moturi, Blogger and Writer. From writersbase.org writing company The World has come close and closer with the usage of the internet. With the growth of this, many evils…
Security Orchestration is more than Automation
The Myth of the Unmanned SOC By Amos Stern, CEO, Siemplify It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal…
The Great Tech Transfer—A Success Story in Innovation
By John Shearer, Co-Founder, and CEO, DarkLight Solving business challenges often requires innovation, but fostering creativity and growing new technologies is a challenge in itself. Creating new services and products…
Startups with Information Security in Mind at Startup
What’s this all about and does it really matter? By Kip There are some very talented people starting a company’s solving very complex problems that can save organizations millions of…