Secure, Managed File Transfer: What’s Old is New Again
Intrigue and Espionage May not Come to Mind when You Think of MFT—But it Should By Gregory Hoffer, CEO, Coviant Software When you think about secure, managed file transfer (you…
The Best Network Protection: Go Deep or Go Broad?
By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their…
SOCs to Turn to Security Automation to Cope with Growing Threats
Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more…
Facebook took action against China-linked APT targeting Uyghur activists
Facebook has closed accounts used by a China-linked APT to distribute malware to spy on Uyghurs activists, journalists, and dissidents living outside China. Facebook has taken action against a series of…
Why Security Shouldn’t Only Fall on Employees
By Amit Bareket, Co-founder and CEO, Perimeter 81 As each day passes by, the news of a new data breach grabs the latest headlines. While there could be many reasons…
Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021
As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully…
Moving to Active Defense: What It Means, How It Works and What You Can Do Now
By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move…
Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?
By Gus Evangelakos, Director Field Engineering, XM Cyber Cybersecurity is an asymmetric battle — and one in which attackers hold an unfair advantage. Adversaries maintain the initiative and can attack…
Your Vulnerabilities are Making You Miss Your Misconfigurations
IT organizations regularly configure asset discovery tools in ways that leave them open to abuse by attackers; Vendor configuration documentation lacks details on the risk. By Evan Anderson, Director of…
FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK
The FBI has issued an alert to warn about an increase in PYSA ransomware attacks on education institutions in the US and UK. The FBI has issued Tuesday an alert…
Why ‘Thinking Small’ Is the Way to Stop Ransomware and Other Cyber Attacks
By Yuval Baron, CEO at AlgoSec, explains why micro-segmentation is one of the most effective methods to limit the damage of attacks on a network On August 15, 2020, the…
Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence
By Udi Levy, CEO & Co-Founder at Cobwebs Technologies With a growing number of malicious cyber activities, threat intelligence has become an integral part of many organizations. Most threat intelligence…