Funding Schemes and Cyber Security
By Milica D. Djekic What a lovely day; you are just searching your web for some online business opportunities or you are reviewing the cyberspace to get the stipend for…
How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined Perimeters
By Don Boxley, co-founder, and CEO, DH2i [https://dh2i.com] Cybersecurity researchers at the independent security research group JSOF recently discovered at least 19 security vulnerabilities that are found at the base…
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract…
Compliance in A Connected World
By Kirsty Fisher, CFO, Titania In 2019, Microsoft made waves at its annual Black Hat conference in Las Vegas, where it confirmed its discovery of a malicious hacker group that…
Are the Worst Cryptocurrency Security Breaches Behind Us?
By Tim Fries, Co-Founder, The Tokenist You would be right in assuming that blockchain itself was never hacked, but that doesn’t mean people don’t like to give up security features…
Why Academic Openness and A Rise in Online Classes Should Invoke A Renewed Focus on Security
By Anthony Bettini, CTO, WhiteHat Security For decades, researchers and students from around the world have come to study and collaborate, research, and innovate at American universities and colleges under…
Build Your AI Incident Response Plan… Before It’s Too Late
By Patrick Hall* and Andrew Burt** * Patrick Hall is a principal scientist at bnh.ai, a boutique law firm focused on AI and analytics, and an adjunct professor in the…
TLS/ SSL Decryption – One of the Main Pillars of Zero Trust Model
By Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks In a world where everything and everyone is connected to the internet, in one way or another,…
Getting Employees Back to the New Normal
Work will never be quite the same once the pandemic has passed By Brendan O’Connor, CEO, and Co-founder, AppOmni There are encouraging signs that the Covid-19 pandemic – arguably the…
Network Security Is Not Data Security
Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks…
Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of…