Cybersecurity Education and Practice: Never Stop Learning
By Ken Sigler, Dan Shoemaker, and Anne Kohnke As the number of industries, organizations, and educational institutions continue to recognize the scope and impact of cybersecurity, the means in which…
COVID-19: How to Take Advantage of Teleworking
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt With the COVID-19 outbreak, companies and governments are taking preventive measures that include teleworking. This can be a turning point in the way we look…
Top 5 Coronavirus Scams
By Zack Schuler, founder and CEO of NINJIO One of the reasons NINJIO content is so successful at capturing and holding employees’ attention is its relevance – we release new…
A Cyber Approach to Coronavirus Containment
By Zohar Rozenberg What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign? In recent years, some in the cyber world recognize…
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just…
How To Manage Your Small Business In Time Of Crisis
By Milica D. Djekic It’s always a challenge to manage your small business, but especially in times of crisis. Such a situation requires special skills, such as crisis management skills,…
The Cost of Cybercrime Is Constantly Rising: How to Combat Ransomware Attacks on SMBs
By Rui Lopes, Sales Engineering and Technical Support Director, Panda Security Cybercrime is an undeniable constant in the business landscape these days. The cost of cybercrime is constantly rising—it is…
Credential Stuffing: Why It’s on The Rise and How to Decrease Your Risk
By Kevin Landt, VP of Product Management at Cygilant Reports of high-profile data breaches like Equifax’s, LinkedIn’s, or Yahoo’s always caused an initial, widespread panic — and for good reason. But…
Achieving Effective User Lifecycle Management Through Automation
By Jeff Stein, Information Security Architect, Reputation.com When considering the security of an enterprise, a key area ripe for automation should be user lifecycle management. The topic is important not…
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn…
Moving Beyond Honeypots to Next-Generation Deception Technology
By Wade Lance, field CTO, Illusive Networks When security professionals hear the word “deception,” they tend to immediately think of honeypots. That association needs to be updated. The concept of…