Latest Posts

0e4d50f3874398fa86bb0633f1cd7ee4

Taking Advantage of Network Segmentation in 2019

January 16, 2019 Added by:Reuven Harrison

Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.

Comments  (0)

96a17fa8fecf60ce60cddfd6be1d2c57

Why Zero Tolerance Is the Future for Phishing

January 09, 2019 Added by:Gary De Mercurio

Phishing attacks are really the ones that bring most organizations to their knees and are at the very start of some of the most devastating cyberattack

Comments  (0)

3f8fa5a4e650a6a247d80b4e3ae6b8c0

Universities Beware! The Biggest Security Threats Come from Within the Network

January 08, 2019 Added by:Victor Danevich

While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

IAST Technology Is Revolutionizing Sensitive Data Security

January 08, 2019 Added by:Asma Zubair

IAST is the most optimal way to test for application security, sensitive data leakage, and prevent breaches.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board

January 04, 2019 Added by:Steve Durbin

Four security topics businesses should focus on in 2019.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Unlocking the Power of Biometric Authentication with Behavior Analytics

January 04, 2019 Added by:Jackson Shaw

As biometrics continues to gain popularity in the authentication world, it’s important to keep in mind that multi-factor authentication is critical and behavior biometrics alone are not enough to fully protect your business.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Cybercriminals Hide Malware Commands in Malicious Memes

January 03, 2019 Added by:Ionut Arghire

Trend Micro security researchers have discovered a new piece of malware that receives commands via malicious memes its operators published on Twitter.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Miori IoT Botnet Targets Vulnerability in ThinkPHP

January 03, 2019 Added by:Ionut Arghire

A recent variant of the Mirai botnet is targeting a remote code execution (RCE) vulnerability in the ThinkPHP framework, Trend Micro security researchers warn.

Comments  (0)

7ef71cd75aa3f9af047bff6623ac9259

2019, The Year Ahead in Cloud Security

January 02, 2019 Added by:Peter Martini

In 2019, cloud security will confound organizations as concerns over data privacy, and the security skills gap pervade. But the cloud will come to its rescue.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

The End (of 2018) Is Near: Looking Back for Optimism

December 31, 2018 Added by:James Lee

While we wait to see if 2018 is a one-off or a movement, let’s look at what to expect in 2019.

Comments  (0)

4238fc46fe869de66700ec14d6738248

IT security Predictions for 2019 – Verifying Trust

December 19, 2018 Added by:Scott Gordon

With moves towards Hybrid IT adoption showing no signs of slowing down, 2019 will be the year when Zero Trust and Software Defined Perimeter take shape!

Comments  (0)

97dc236369e7b32f4b9281ae4382c2ee

Vote for Blockchain [Voting]

December 19, 2018 Added by:George Levy

The current voting system is ripe for change and blockchain will likely play a large role in the evolution of our electoral processes.

Comments  (0)

869d5051fd78f97e77e577a44a4016da

Conflicted External Auditors at Heart of Equifax Data Breach

December 13, 2018 Added by:Christopher Paris

Equifax hired financial auditors and IT security auditors from different divisions of Ernst & Young, creating conflicts of interest that may have disincentivized both auditing teams from reporting problems that eventually led to the company’s 2017 data breach.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Chrome 71 Patches 43 Vulnerabilities

December 07, 2018 Added by:Ionut Arghire

Google has released Chrome 71 to the stable channel with 43 security fixes inside, as well as with a series of additional protections to improve the overall user experience.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Trojan Horses for the Mind

December 07, 2018 Added by:Perry Carpenter

When designed well, our messaging can sneak past mental defenses and noise. In other words, the way we design and deliver our messages can become a Trojan Horse.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

5 Cybersecurity Predictions for 2019

December 04, 2018 Added by:Joseph Carson

The year is coming to a close. Therefore, it is important to analyze developing trends and prepare for the ever-changing threat landscape.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

OceanLotus Targets Southeast Asia in New Watering Hole Campaign

December 03, 2018 Added by:Ionut Arghire

A cyber-espionage group believed to be operating out of Vietnam has compromised over 20 websites as part of a watering hole campaign targeting users in Southeast Asia, ESET reports.

Comments  (0)

4238fc46fe869de66700ec14d6738248

Securing the BYoD Workplace

November 28, 2018 Added by:Scott Gordon

A secure organization rises to meet the challenges posed by BYoD instead of letting them fly overhead.

Comments  (0)

5a2b18375de7f48025d85018748d326e

Cyber Security Lessons from Abroad – Australia’s Essential Eight

November 28, 2018 Added by:Kevin Alexandra

Whitelisting applications and restricting administrative privileges play important roles in helping organisations identify vulnerable assets and set appropriate defences for their networks and applications.

Comments  (0)

4238fc46fe869de66700ec14d6738248

Will We Get a GDPR for the IoT?

November 28, 2018 Added by:Scott Gordon

It might then be a good idea to imbue IoT security with the kind of weight that the GDPR gives personal data.

Comments  (0)