Smart Gadgets in Proving Workplace Violence
By Milica D. Djekic The violence at the workplace could start as the common insult, continue as the verbal abuse and end up as the mobbing attack that could get…
HIPAA Compliance and The Protection of Cyber Security
By Andrew Mikhailov, CTO at Zfort Group Businesses face the risk of severe cyber-attacks – the present-day cyberspace criminals are well-organized, thoughtful, and marketable. And one of the most sensitive…
Is API Usage Putting Your Organization Out of Compliance?
By Matt Keil, Director of Product Marketing, Cequence Security APIs (“Application Programming Interfaces”) are increasingly being used as the conduit for data exchange between applications, infrastructure, and IoT devices. The…
TLS/ SSL Decryption – One of the Main Pillars of Zero Trust Model
By Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks In a world where everything and everyone is connected to the internet, in one way or another,…
Looks Like Russian Hackers Are on An Email Scam Spree
By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email…
Why Are Fully Staffed Cybersecurity Teams Unable to Keep Up with Hacks?
By Steve Salinas, Head of Product Marketing, Deep Instinct Faced with mounting cyber threats, large enterprises are devoting more resources than ever to improving their cybersecurity posture. According to a…
4 Simple Ways to Repel Ransomware as The Rise in Remote Work Continues
By Kris Lahiri, Co-founder and Chief Security Officer of Egnyte Ransomware attacks are now the most common security incident taking place today. According to a recent report from TrustWave, ransomware…
Can We Better Leverage Our – Already Scarce – Cyber Security Human Resources?
By Douglas Ferguson, Founder & CTO, Pharos Security It is accepted that there is a significant cybersecurity skills deficit. The result, it is argued, is that cybersecurity teams do not…
WireGuard – Separating Fact from Fiction
By Tomislav Čohar, co-founder, hide.me VPN Offering high speeds, excellent levels of security and a low footprint, WireGuard has rightly caused ripples within the VPN industry. WireGuard is an open-source…
Network Security Is Not Data Security
Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks…
COVID-19 And Security Team Cuts Are Costing Businesses in Cyber and Financial Risks
By Samantha Humphries, security strategist, Exabeam With 71% of cyber professionals reporting increased threats since the COVID-19 pandemic started, are SOCs prepared to mitigate these threats? The Exabeam 2020 State…
Cyber Security Market to Reach USD 400 Billion by 2026
The cybersecurity market will be driven by rising demand for cyber protection as well as advanced network infrastructure security across enterprises. By Saloni Walimbe, Content Writer at Global Market Insights,…