For A Fully Rounded Defence, Automate
By Karen Levy, Vice President, Product and Client Marketing, Recorded Future Cybercriminals are now running their operations in a way not dissimilar to modern legitimate businesses. Criminal groups have organizational…
Facebook’s $550 Million Settlement: A Warning to Companies Collecting Biometric Data
Facebook’s significant settlement could incite future class action lawsuits, further emphasizing the need for companies to comply with biometric privacy laws. By Billee Elliott McAuliffe, Member, Lewis Rice Thanks to…
Cyber Leads Global Business Risks for First Time: Allianz Risk Barometer 2020
By Kelly Castriotta, North American Head of Product Development for Financial Lines at Allianz Global Corporate & Specialty For the first time ever, Cyber incidents (39% of responses) ranks as…
Don’t Enable Hackers and Employees at The Same Time
By Dor Knafo, CEO, co-Founder, Axis Security When work from home went from a luxury to mandatory overnight, that put a lot of pressure on already stretched IT, teams. The…
A Guide to Firewalls: Best Firewalls for VOIP And Unified Communications
By Christopher Gerg, CISO and VP of Cyber Risk Management, Tetra Defense The overwhelming popularity of VoIP Private Branch Exchange systems (PBX) in the modern workplace demonstrates that the benefits…
Debunking the Top Myths in Vulnerability Management for A Safer Enterprise
By Dr. Deepak Kumar, Founder, and CEO, Adaptiva Cybersecurity is one of the most daunting challenges enterprises will face in 2020. According to IBM’s 2019 Cost of a Data Breach Report, the…
Practical Vulnerability Remediation Strategies
By Syed Abdur, Brinqa Cyber vulnerabilities have a way of piling up. Vulnerability assessment and scanning tools report them in droves from every corner of the technology infrastructure – network,…
The Cyber Challenges of the 21st Century
By Emil M.Hasanov The National Cyber Strategy demonstrates my commitment to strengthening America’s cybersecurity capabilities and securing America from cyber threats. It is a call to action for all Americans…
KPMG Recommends Steps to Bolster Cybersecurity in the COVID-19 Era
By Ton Diemont, Head of Cybersecurity at KPMG in Saudi Arabia Hackers are jumping on the COVID-19 pandemic to exploit global uncertainty Riyadh, 07 April 2020: The outbreak of Covid-19…
Cybercriminals Exploit Coronavirus with Wave of New Scams
By David Ruiz, Malwarebytes Labs With no vaccine yet developed, and with much of the world undergoing intense social distancing measures and near-total lockdown procedures, threat actors are…
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just…
The Hard Drive Secondary Market: The Sorry State of The Industry
Why NextUse Hard Drive Quality Surpasses the Competition By James Mannering, Hard Drive Product Manager at NextUse Remarketing, the reselling of end-of-life or retired IT assets like hard drives, is…