4 Reasons Why Cyber Security Is Important in Your Business
By Gabe Nelson, Content Specialist, Bonus.ly Cyber-attacks are incredibly common and anyone can fall victim to them. Cyber-attacks can cause electrical blackouts, failure of military equipment, and breaches of national…
Why Endpoint Protection Should Be a Security Priority
Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized…
The Impact Of Blockchain & Crypto On Cyber Security
By Jesús Cedeño, Senior Editor, cryptocoinsociety.com These days many people (especially if they’re more or less tech-oriented) have heard about cryptocurrencies and blockchains. Even if they don’t fully understand these…
The Limitations of SASE and Zero Trust
By Jayant Shukla, CTO, and Co-Founder, K2 Cyber Security Over the past several years, two industry buzz terms have really started to gain traction. SASE (Secure Access Service Edge) was…
FIRST launches new code of ethics for incident response and security teams on Global Ethics Day
By Shawn Richardson, Ethics SIG co-Chairs of FIRST. October 21, 2020 – following a global consultation, the Forum of Incident Response and Security Teams (FIRST) is launching new ethics guidelines…
Why Deepfakes Will Threaten the Future of Digital Communications
By Steve Durbin, Managing Director, Information Security Forum Advanced deepfakes of high-profile individuals or executives will soon threaten to undermine digital communications, spreading highly credible fake news and misinformation. Deepfakes…
The Challenges of Industrial 3D NAND
By Roger Griesemer, General Manager Memory Solutions, Swissbit AG and Ulrich Brandt, Technical Director Marketing, Swissbit AG 3D NAND is a popular topic on websites, in magazines, in advertisements and…
3 Steps to Reimagine Your AppSec Program
By Jake Reynolds, Product Manager at NetSPI and Nabil Hannan, Managing Director at NetSPI With Continuous Integration/Continuous Deployment (CI/CD) increasingly becoming the backbone of the modern DevOps environment, it’s more…
Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions
Provide Users Fast and Secure Connectivity from Anywhere with the Leading SASE Platform Based on Containerization for Complete Data Isolation With increasing bandwidth, encrypted traffic, shifts to cloud applications like…
Years of Iot Hacking, But What Have We Actually Learned?
By Brad Ree, CTO, ioXt Alliance Since the inception of the Internet of Things (IoT) in 1999, connected devices have been integrated into nearly every industry, from retail to automotive…
One Year on From Whatsapp Hack- What’s Changed?
In 2019, WhatsApp was hacked using sophisticated NSO spyware, Pegasus, used to spy on iOS WhatsApp users’ phones. By Nicole Allen, Marketing Executive, SaltDNA One year on from WhatsApp Hack…
COVID Impact on MSSPs
By Tristan Hinsley, Cybersecurity Expert, TDI Security Given the remote nature of most Managed Security Service Providers’ (MSSPs) business operations, most would imagine they would be well-positioned to deal with…