How Consumers Can Protect Their Identity after a Data Breach
Steps to safeguard personal information in a vulnerable cyber-space. By Paige Schaffer, CEO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit In an age where large retailers,…
Cloud Security Essentials — Session Monitoring
By Morey Haber, CTO & CISO, BeyondTrust The near-perfect personal attack vector is “shoulder surfing.” If you are not familiar with the concept, it is literally a threat actor looking…
Hidden and High Priority Threats
Understanding Destructive Objects By Tyson Whitten, Vice President of Global Marketing, ReversingLabs Are you confident in what you saw today? It’s a simple, yet important question that nobody in security…
Flexibility in Vulnerability Management: Why it’s Essential
By Jim Souders, Chief Executive Officer, Adaptiva Eighty percent of cyberattacks happen at the endpoint today. When you consider that cybercrime is projected to cost $6 trillion annually by 2021,…
Cyber Security Fears of Today and Tomorrow
“The future depends on what you do today.” ― Mahatma Gandhi By Sasha Kranjac Cyber Security Fear of Today I trust respected cloud vendors. After all, why shouldn’t I? They…
The security’s challenges of an Internet of Things
By Milica D. Djekic The Internet of Things (IoT) is not that new concept beginning with these days. It’s more like the name of the current state being correlated with…
Untethered Power Sourcing Could Hitch Devices to Additional Security
Spinning the cybersecurity story for device owners with a wireless spool. By Anamika Kumari, Content Writer, Allied Analytics LLP The invention of USB connect was revolutionary in its own. Ajay…
Ransomware Is the Biggest Online Threat. Learn Who to Protect, or You’ll Hate Yourself Later
By David Balaban Previous years have shown us one important thing – ransomware is going to stay and get worse. When even the minor ransomware creators are making a lot…
Why compromised credentials are one of the biggest threats facing businesses today
By François Amigorena, CEO, IS Decisions As a business, there are few things worse than realizing you’ve become a victim of a serious cyber attack. The consequences can be dear,…
Cyber Security and the Supply Chain: Strengthening the Weak Links
By Simon Taylor, VP Product at Glasswall Solutions In today’s cybersecurity climate, with high-profile hacks and data breaches constantly in the headlines, businesses are putting more effort than ever into…
The challenges of the good incident response strategies
By Milica D. Djekic The incident response (IR) is one of the key challenges to a modern cyber defense. Practically, it would include three crucially important steps being (1) preparation,…
Addressing the Growing Risk of Personal File-Sharing Apps at Work
By Mika Javanainen, Senior Director of Product Management, M-Files Corporation Thousands of employees around the world are inadvertently putting their organizations at risk by using personal file-sharing apps such as…