Latest Blog Posts

F3bd25e6f3b8f01dc21a92182761fb8a

Avoiding Fuelling the Cyber-Crime Economy

August 11, 2020 Added by:Marc Wilczek

What drives the cyber-crime economy, and how can organizations prevent their data being used as a criminal commodity?

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Expect Behavioral Analytics to Trigger a Consumer Backlash

August 10, 2020 Added by:Steve Durbin

The deployment of cameras, sensors and applications in public and private places for behavioral analytics will be followed by consumer and regulatory backlash.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Holding public cloud security to account

August 10, 2020 Added by:Avishai Wool

The public cloud provides great flexibility and cost management for organizations, but what about security?

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

No Silver Bullet for Addressing Cybersecurity Challenges During Pandemic

August 10, 2020 Added by:Liviu Arsene

As the coronavirus pandemic forced organizations to migrate to a work-from-home context, security professionals faced new challenges.

Comments  (0)

5fbfa7473f12e37a0ebbc623dcd9619f

Could the Twitter Social Engineering Hack Happen to You?

August 10, 2020 Added by:Tim Mackey

The phishing attack on Twitter employees serves as an opportunity for all businesses to reassess how they build and deploy application

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Augmented Reality Will Compromise the Privacy and Safety of Attack Victims

July 08, 2020 Added by:Steve Durbin

Augmented Reality (AR) technologies will provide new opportunities for attackers to compromise the privacy and safety of their victims.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Ending the Cloud Security Blame Game

July 08, 2020 Added by:Avishai Wool

Security is primarily your responsibility – with help from the cloud provider.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Make It So: Accelerating the Enterprise with Intent-Based Network Security

June 13, 2020 Added by:Avishai Wool

How organizations can realize the benefits of intent-based networking across their hybrid networks.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Threat Horizon 2022: Cyber Attacks Businesses Need to Prepare for Now

May 01, 2020 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors

April 07, 2020 Added by:Steve Durbin

Marriott International has experienced their second data breach

Comments  (0)

2054518f64771a7898b1b5d0a1e146cc

Examining Potential Election Vulnerabilities: Are They Avoidable?

April 07, 2020 Added by:Tim Matthews

In the U.S and global communities, election security is a large concern.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Google Skips Chrome 82, Resumes Stable Releases

March 29, 2020 Added by:Ionut Arghire

Google is on track to resume the roll-out of stable Chrome releases next week, but says it will skip one version of the browser.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Benchmarking the State of the CISO in 2020

March 27, 2020 Added by:Marc Wilczek

A run-down of Cisco's 2020 CISO Benchmark Report.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Cyberattacks a Top Concern for Gov Workers

March 03, 2020 Added by:Ionut Arghire

More than half of city and state employees in the United States are more concerned about cyberattacks than they are of other threats, a new study discovered.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Hackers Target Online Gambling Sites

February 19, 2020 Added by:Ionut Arghire

Gambling and betting operations in Southeast Asia have been targeted in a campaign active since May 2019, Trend Micro reports.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »