Security Featured Articles
-
Businesses Beware: Hackers Exploiting Coronavirus Scare
The coronavirus outbreak is now officially a pandemic and is causing much anxiet…
3/23/2020
How to protect yourself from cybercrime?
Protecting yourself from cybercrime is a very challenging task. Everyone is usin…
1/16/2020
Why Businesses Should Use BAS in Their Cybersecurity
Enterprise security firm Norton reported that were already 3,800 data breaches r…
12/11/2019
Reason Cybersecurity Launches Its Business Version for SMBs
Despite frequent news of large enterprises getting hacked, attackers now appear …
10/11/2019
Cynet Is Disrupting the Multibillion Dollar Cyber Security Market
At the age of 15, Eyal Gruner first stepped into a bank with his parents. He was…
12/14/2018
Adaptive Security is Possible with Advanced Threat Detection Solutions
According to the April 2016 Symantec Internet Security Threat Report, there were…
3/21/2017
Help Wanted: 1.8 Million Cybersecurity Professionals
There's a shortage of workers in cybersecurity, a development that leaves us all…
2/15/2017
3 Ways to Defend Against The New Domain Name Exploit
Cybercriminals are using a new scam to trick end users into clicking on misleadi…
2/13/2017
Data Breaches Are Costing Victims Big
We all know some of the ancillary costs of data breaches. The loss of face in th…
2/2/2017
Combating Cybercrime in 2017 by Building an Information Security Program
As far as we've come with information security, the landscape still feels like t…
1/17/2017
Tips for Fighting Against Ransomware
Hackers are now able to make money by blocking access to secured data from the o…
1/9/2017
Hacking Highlights of 2016
Reports on data breaches and hacks hit the headlines on an almost daily basis th…
12/12/2016
Are You Protected from Mobile Cybercrime?
A webinar discusses how the world's growing connectivity puts individuals and bu…
12/5/2016
Why Business Travelers are Vulnerable Targets for Cyberattacks
If you travel frequently for business, you should be aware of the security dange…
11/15/2016
Can AI Mixed With Ambience, Topped With Behavioral Analytics, Be The Perfect Cybersecurity Recipe?
Effective cybersecurity is becoming increasingly important as hackers and other …
11/11/2016
Hacking Goes Mainstream
The concept of secret information harkens back to a time when only top spymaster…
10/24/2016
Identity Theft Remains Most Common Cybercrime, with 79 Percent of Targets in North America
The numbers show that data breaches remain a serious threat to businesses across…
10/7/2016
Vimtag Camera Brings Peace of Mind
Connected cameras are becoming an important tool in the households of many as th…
9/30/2016
10 Essential Security Points Startups Should Keep in Mind
By keeping these important security points in mind, you can protect your startup…
8/23/2016
Top 500 Companies That Will be Part of the Trillion Dollar Cybersecurity Industry
Cybersecurity Market Report forecasts global spend on cyber security products an…
8/16/2016
Five Security Technologies to Consider in 2016
To say cyber threats evolve with the evolution of technology each year would be …
8/16/2016
Five Recommendations to Enterprises in the Middle East for Improving Network Security
In May this year, we posted results of our 'network protection survey,' which lo…
8/15/2016
Cyber Attacks: Guarding Yourself from the Internet of Threats.
What's the most probable thing that you think can impact you significantly? If y…
8/8/2016
Bourne to be Wild!
I saw it the movie opening night. I am likely to see it again since it is that g…
8/5/2016
Automotive Industry Working on Best Practices List to Provide Security for Connected Cars
Auto Industry Working on Best Practices List to Provide Security for Connected C…
7/28/2016
Protecting Your Organization with Automated Cyber Security Incident Response
Recent news reports about massive data breaches have unfortunately, quickly beco…
7/26/2016
Is the Use of Malware Out of Date?
Cyber criminals have been using Malware to cause data breaches and steal credent…
7/22/2016
Cyber Attacks Deal Harsh Blow to UK Companies
Cyber attacks on companies in the UK are literally costing organizations billion…
7/18/2016
Insurance Industry Must Confront Data Breaches on Two Fronts
Insurance companies can be the target of a breach and can be impacted by how wel…
7/1/2016
Cyber Security Attacks Which Could Have Been Prevented
Frederic Nze, CEO and Founder of Oakam looks at steps that could have prevented …
6/22/2016
Security Focus Should Be on Data, Not Just Perimeter
Data Security Confidence Index from Gemalto highlights need to shift breach focu…
6/14/2016
U.S. Veteran Affairs Department Puts Out RFI for Help with Dark Web
The best analogy that comes to mind is the invention and development of what we …
5/18/2016
Pindrop Study Shows Spike in Call Center Fraud
Pindrop found in its 2016 Call Center Fraud Report that the number of phone frau…
5/11/2016
Shedding Some Light Inside the 'Dark Web'
You may have heard about it whispered in tech circles, or someone made an obliqu…
5/9/2016
It's A Trap! Preparing For Smokescreen DDoS Attacks
The threat landscape is more complex than ever, and establishing a cybersecurity…
5/6/2016
Ransomware is Real: Webinar Tells How To Protect Yourself Now
One of the most prevalent forms of malware in today's world of cybersecurity is …
5/5/2016
Threat of Ransomware-as-a-Service Growing
A combination of availability on the Dark Web and the ability to anomalously pay…
4/27/2016
The Last Security Tool
When attacks external or internal cyber attacks occur IT needs on demand, real-t…
4/19/2016
Perspica Launches Incident Replay, an Application Infrastructure Time Machine
Perspica Incident Replay provides past, present and predictive analytics to keep…
4/19/2016
Beating 'Defeat Devices' in Advanced Malware
New malware knows when it's being investigated and actively evades detection. Ch…
4/12/2016
Top 7 Cyber Security Tips for Startups
Seven security tips that every startup can use to keep information safer in the …
4/12/2016
Is Your Website Safe? More Businesses Choose WAF for Website and App Protection
A server attack can cause serious problems for a business, leading to a loss of …
4/12/2016
5 Call Center Security Tips For Protecting Customer Data and Preventing Breaches
The competitive landscape in the business realm has many organizations managing …
4/6/2016
Agari Enterprise Protect Protects against Spear Phishing
Agari Enterprise Protect stops sophisticated, difficult to detect spear phishing…
4/1/2016
AllClear ID Releases Reserved Response Program
Program designed to reserve response capacity needed in advance to mitigate risk…
4/1/2016
Corero Network Security: DDoS Attacks Hurt More Than Just Systems
Corero's second-annual DDoS Impact Survey notes DDoS attacks have far-reaching c…
3/24/2016
Password Verification and Authentication: How to Combat Cyber Crime
Mondo advises two-step verification and authentication for apps and the web as b…
3/22/2016
Aeriandi to Boost Partnership with Sage Pay
The pair expects to target a number of industries that are expected to rapidly g…
3/18/2016
Preventing DNS-Based Data Exfiltration
Several high-profile data breaches have been in the news recently. We read that …
3/17/2016
NATO Taps Fortinet for Help with Cybersecurity
NATO's Communications and Information Agency has tapped security company Fortine…
3/16/2016
Survey by Clutch Highlights the State of Cloud Security and the Enterprise
Clutch survey illustrates mixture of enthusiasm and skepticism about cloud benef…
3/14/2016
Damballa's Q1 2016 State of Infections Report Highlights how Cybercriminals Evade Detection
Damballa's Q1 2016 State of Infections Report illustrates that how and why what …
3/11/2016
Securing Payment Card Data: Three Actions to Take Now
In the retail world, there is often a misguided mindset of fire and forget when …
3/11/2016
PFU Systems, FireEye Network Security Combine for Better Enterprise Security
Protecting the network has always been important, and if it's ever been possible…
3/10/2016
DB Networks Identifies Credential Abuse with Machine Learning and Behavioral Analysis
Credential identification is one of the issues that is part of the legal battle …
3/7/2016
Could Phishing Expeditions Stop Cold with Deeper Insight?
Easy Solutions, a fraud protection company, recently did some research into phis…
3/2/2016
Intel Security Expands Partner System to Fight Targeted Attacks
More than 30 Intel Security Innovation Alliance partners have joined the program…
3/2/2016
IBM Continues to Promote Collaboration on Cybersecurity
IBM and Check Point recently announced the formation of a relationship to fight …
3/2/2016
Nokia Report Finds 60 Percent of Infections in Mobile Network from Smartphones
Nokia's Threat Intelligence Lab Released research results today showing that, fo…
3/1/2016
Exabeam Launches Threat Hunter Solution to Battle Cyber Attacks
While there are a number of different approaches that companies are taking in or…
3/1/2016
Startup enSilo Clears $21 Million in Funding to Offer Targeted Attack Protection
For most companies, protecting computer systems begins and mostly ends with peri…
3/1/2016
New Products Introduced to Data Protection Suite
Dell recently announced some new additions to its Dell Data Protection solution …
3/1/2016
The Evolution of Cybersecurity: A Look at One Leap Year to the Next
This year you may have noticed that February 29th has made an appearance on your…
2/29/2016
Gemalto 2015 Breach Level Index Findings Provide Granularity on Global Activities
The massive 2016 RSA Conference in San Francisco starts February 29, and it alre…
2/26/2016
Proofpoint: Human Behaviors Prove a Cybercrime Draw
In the end, the basic principles about clicking links from unfamiliar users stil…
2/24/2016
Risk Management Assessment is Key to Maintaining Cybersecurity
When it comes to cybersecurity service providers, there are very few companies t…
2/24/2016
Synaptics Announces New Technology Designed to Thwart Fingerprint Spoofing
Understandably, Synaptics does not go into great detail about how this technolog…
2/22/2016
|
|