Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of…
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site…
Nations—Not Individuals—Are After Your IP
By Ryan Benner, Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted…
Magecart May Make Holidays Less Merry
Third-party plug-ins driving most retail sites can open doors to attackers by Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks In the unprecedented year of 2020, the rise…
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear…
The Serverless Security Machine
By Art Sturdevant, Director of Operations, Censys Servers are BS. They require constant maintenance, monitoring, and tweaking. As a security practitioner, regardless of where your team lands on the org…
The One-Stop Spear Phishing Defense Guide You Will Ever Need
By Jeff Penner, Senior Manager at ActiveCo Technology Management. Is your business ready to combat spear phishing attacks? It’s a question that gives many seasoned CTOs bad jitters. The truth…
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations…
Automated Pentesting – Ready to Replace Humans?
Is Automation the end of human pentesting? By Alex Haynes, CISO, CDL In the past few years, automation in many spheres of Cybersecurity has increased dramatically, but pentesting has remained…
Data Migration Security
WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping…
Why Cybersecurity Awareness is More Important During COVID-19
Do you know the need for cybersecurity training for your organization? If not, learn more about the importance! By Susan Alexandra, Contributing Writer Cyber-attacks, malicious activity, and phishing scams have…
Changing Cybersecurity Culture One Habit at A Time
By George Finney, Chief Security Officer for Southern Methodist University and Author of Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future My first job out of college…