2021 Predictions: Addressing the Challenge of Cloud-Native App Security
By Ankur Singla, Founder and CEO of Volterra Organizations of all sizes are adopting cloud-native application design and deployment practices as they continue to digitally transform business processes. This includes…
5G Security
Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies 5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications…
The 2021 Perspective – Challenges and Milestones for The VPN Industry
By Sebastian Schaub, CEO and Co-Founder, hide.me VPN The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double in value over the next…
Experts discovered a new Trickbot module used for lateral movement
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target organization. Cybersecurity researchers discovered a new module of the Trickbot…
How To Keep Your Children Safe In Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault As parents, we have conflicting feelings on remote learning. One on hand, we want our children to stay healthy, especially in…
Cybersecurity Maturity Model Certification (CMMC)
It is not about compliance, or is it? By Carter Schoenberg, CISSP & CMMC Registered Practitioner Vice President – Cybersecurity SoundWay Consulting, Inc. As of the date of this publication,…
3 Email Hacking Techniques to Watch In 2021
By Adrien Gendre, Chief Product & Services Officer, Vade Secure Ransomware hobbled businesses in 2020, while COVID-19 spawned an endless stream of cyberattacks. What both have in common is email….
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site…
Data Migration Security
What to Know By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping…
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!) By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the…
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear…
The One-Stop Spear Phishing Defense Guide You Will Ever Need
By Jeff Penner, Senior Manager at ActiveCo Technology Management. Is your business ready to combat spear phishing attacks? It’s a question that gives many seasoned CTOs bad jitters. The truth…