Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted…
Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?
By Raj Dodhiawala, President, Remediant Lateral movement using compromised admin credentials is integral to almost all ransomware and malware attacks today. Specifically exploiting privilege sprawl—or the always-on, always-available administrative access…
Redefining Resilience in The New World of Work
By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic has accelerated the move towards hybrid and remote working which was already…
How To Defend Railway Subsystems from Targeted Cyber-Attacks
By Michael Cheng, Director at TXOne Networks & C. Max. Farrell, Senior Technical Marketing Specialist at TXOne Networks Railways are a critical part of every nation’s vital system. Maintaining the…
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept to cybersecurity professionals – and hackers. According to a recent study, phishing attacks are…
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to the cybersecurity industry By Bryon Kroger, Founder of Rise8 Following the…
Is XDR The Right Solution for Today’s Security Threats?
Defining XDR’s Role in the Security Stack By Steve Garrison, VP Marketing, Stellar Cyber XDR and Open XR are two of the latest buzzwords in the cybersecurity tools market, but…
How to strengthen cyber resilience with Unified BCDR
By Joe Noonan, General Manager, Unitrends and Spanning Cybercrime and hybrid work environments prompted by the pandemic have significantly impacted the way organizations protect and store their data. Data is…
Don’t Become a Horrible Headline: Some Tips on Redesigning Your Threat Posture for The 2022 Threat Landscape
By Omar Zarabi, Founder and CEO, Port53 Technologies As in previous years, the DefCon of the cybersecurity industry is best illustrated by the headlines – each a cautionary tale. The…
Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by the End of Q3 2021
By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat actors are not far behind as they target users with increasingly sophisticated and complex…
Ransomware — Encrypt Your Data Before Others Do
Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A single malicious email, with the sender of the mail disguised as a…
Why Building Managers Need to Prioritize Cybersecurity
By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things (IoT), buildings have become elaborate networks of software and hardware designed to…